Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8h22-8cf7-hq6g

Опубликовано: 27 фев. 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Rails has possible Sensitive Session Information Leak in Active Storage

Possible Sensitive Session Information Leak in Active Storage

There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak.

This vulnerability has been assigned the CVE identifier CVE-2024-26144.

Versions Affected: >= 5.2.0, < 7.1.0 Not affected: < 5.2.0, > 7.1.0 Fixed Versions: 7.0.8.1, 6.1.7.7

Impact

A proxy which chooses to caches this request can cause users to share sessions. This may include a user receiving an attacker's session or vice versa.

This was patched in 7.1.0 but not previously identified as a security vulnerability.

All users running an affected release should either upgrade or use one of the workarounds immediately.

Releases

The fixed releases are available at the normal locations.

Workarounds

Upgrade to Rails 7.1.X, or configure caching proxies not to cache the Set-Cookie headers.

Credits

Thanks to tyage for reporting this!

Пакеты

Наименование

activestorage

rubygems
Затронутые версииВерсия исправления

>= 5.2.0, < 6.1.7.7

6.1.7.7

Наименование

activestorage

rubygems
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.8.1

7.0.8.1

EPSS

Процентиль: 82%
0.01861
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 1 года назад

Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.

CVSS3: 5.3
redhat
больше 1 года назад

Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.

CVSS3: 5.3
nvd
больше 1 года назад

Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.

CVSS3: 5.3
debian
больше 1 года назад

Rails is a web-application framework. Starting with version 5.2.0, the ...

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость компонента Active Storage программной платформы Ruby on Rails, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить конфиденциальную информацию

EPSS

Процентиль: 82%
0.01861
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-200