Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cvw2-xj8r-mjf7

Опубликовано: 09 мар. 2021
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Activerecord-session_store Vulnerable to Timing Attack

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

Recommendation

This has been fixed in version 2.0.0. All users are advised to update to this version or later.

Пакеты

Наименование

activerecord-session_store

rubygems
Затронутые версииВерсия исправления

<= 1.1.3

2.0.0

EPSS

Процентиль: 65%
0.00493
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-208

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 5 лет назад

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

CVSS3: 5.3
redhat
около 6 лет назад

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

CVSS3: 5.3
nvd
почти 5 лет назад

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

CVSS3: 5.3
debian
почти 5 лет назад

The activerecord-session_store (aka Active Record Session Store) compo ...

EPSS

Процентиль: 65%
0.00493
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-208