Sha256: 4c4a89b1157dc93adbebc8066a39fe22908870dae250c806d70ae27afe957fd2
Contents?: true
Size: 607 Bytes
Versions: 2
Compression:
Stored size: 607 Bytes
Contents
--- url: http://osvdb.org/show/osvdb/89939 title: | Rack Rack::Session::Cookie Function Timing Attack Remote Code Execution description: | Rack contains a flaw that is due to an error in the Rack::Session::Cookie function. Users of the Marshal session cookie encoding (the default), are subject to a timing attack that may lead an attacker to execute arbitrary code. This attack is more practical against 'cloud' users as intra-cloud latencies are sufficiently low to make the attack viable. cvss_v2: 7.6 patched_versions: - ~> 1.1.6 - ~> 1.2.8 - ~> 1.3.10 - ~> 1.4.5 - ">= 1.5.2"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.1.1 | data/bundler/audit/rack/2013-0263.yml |
bundler-audit-0.1.0 | data/bundler/audit/rack/2013-0263.yml |