Sha256: a49cddfdb12e54e7fbd709ce05be883b6e70428bd6b582652a28c8a2b0d8dc51

Contents?: true

Size: 1.28 KB

Versions: 1

Compression:

Stored size: 1.28 KB

Contents

---
gem: rack
cve: 2019-16782
ghsa: hrqr-hxpp-chr3
url: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3
date: 2019-12-18
title: Possible information leak / session hijack vulnerability
description: |-
  There's a possible information leak / session hijack vulnerability in Rack.

  Attackers may be able to find and hijack sessions by using timing attacks
  targeting the session id. Session ids are usually stored and indexed in a
  database that uses some kind of scheme for speeding up lookups of that
  session id. By carefully measuring the amount of time it takes to look up
  a session, an attacker may be able to find a valid session id and hijack
  the session.

  The session id itself may be generated randomly, but the way the session is
  indexed by the backing store does not use a secure comparison.

  Impact:

  The session id stored in a cookie is the same id that is used when querying
  the backing session storage engine.  Most storage mechanisms (for example a
  database) use some sort of indexing in order to speed up the lookup of that
  id.  By carefully timing requests and session lookup failures, an attacker
  may be able to perform a timing attack to determine an existing session id
  and hijack that session.

patched_versions:
  - "~> 1.6.12"
  - ">= 2.0.8"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/rack/CVE-2019-16782.yml