Описание
Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it possible for an attacker to forge a secure or host-only cookie prefix.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-8184
- https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c
- https://hackerone.com/reports/895727
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml
- https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak
- https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html
- https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html
- https://usn.ubuntu.com/4561-1
Пакеты
rack
< 2.1.4
2.1.4
rack
>= 2.2.0, < 2.2.3
2.2.3
Связанные уязвимости
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
A reliance on cookies without validation/integrity check security vuln ...
Уязвимость функции parse_cookies_header из utils.rb модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю оказать воздействие на целостность данных