Sha256: a49cddfdb12e54e7fbd709ce05be883b6e70428bd6b582652a28c8a2b0d8dc51
Contents?: true
Size: 1.28 KB
Versions: 1
Compression:
Stored size: 1.28 KB
Contents
--- gem: rack cve: 2019-16782 ghsa: hrqr-hxpp-chr3 url: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3 date: 2019-12-18 title: Possible information leak / session hijack vulnerability description: |- There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. Impact: The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. patched_versions: - "~> 1.6.12" - ">= 2.0.8"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/rack/CVE-2019-16782.yml |