Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0263

Опубликовано: 08 фев. 2013
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat CloudForms Tools 1rubygem-rackWill not fix
Red Hat Enterprise MRG 2rubygem-rackAffected
Red Hat Subscription Asset Manager 1.2candlepinFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2katelloFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2katello-configureFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2rubygem-actionpackFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2rubygem-activemodelFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2rubygem-delayed_jobFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2rubygem-jsonFixedRHSA-2013:068626.03.2013
Red Hat Subscription Asset Manager 1.2rubygem-nokogiriFixedRHSA-2013:068626.03.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=909071rubygem-rack: Timing attack in cookie sessions

EPSS

Процентиль: 90%
0.05283
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

nvd
почти 13 лет назад

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

debian
почти 13 лет назад

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, ...

github
почти 4 года назад

Rack arbitrary code execution via timing attack

EPSS

Процентиль: 90%
0.05283
Низкий

5 Medium

CVSS2