Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8184

Опубликовано: 15 июн. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.

A flaw was found in rubygem-rack. An attacker may be able to trick a vulnerable application into processing an insecure (non-SSL) or cross-origin request if they can gain the ability to write arbitrary cookies that are sent to the application. The highest threat from this vulnerability is to data integrity.

Отчет

Because Red Hat OpenStack Platform 13.0 Operational Tools packages ships the flawed code, but does not use its functionality, its Impact has been reduced to 'Low'. Red Hat Satellite 6 and Red Hat CloudForms ship affected RubyGem Rack, however, since overwriting cookies is not possible products are not vulnerable to the flaw. We may update the Rack dependency in a future releases. Red Hat Gluster Storage 3 ships RubyGem Rack, but the version shipped does not contain the affected code. Therefore, it is impossible to overwrite cookies using this particular flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-amazon-smartstateWill not fix
CloudForms Management Engine 5cfme-gemsetWill not fix
Red Hat Enterprise Linux 9rubygem-rackNot affected
Red Hat OpenStack Platform 10 (Newton) Operational Toolsrubygem-rackOut of support scope
Red Hat OpenStack Platform 13 (Queens) Operational Toolsrubygem-rackFix deferred
Red Hat Satellite 6tfm-ror52-rubygem-rackAffected
Red Hat Storage 3rubygem-rackNot affected
Red Hat Satellite 6.8 for RHEL 7ansible-collection-redhat-satelliteFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansiblerole-foreman_scap_clientFixedRHSA-2020:436627.10.2020
Red Hat Satellite 6.8 for RHEL 7ansiblerole-insights-clientFixedRHSA-2020:436627.10.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-807
https://bugzilla.redhat.com/show_bug.cgi?id=1849141rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names

EPSS

Процентиль: 77%
0.01067
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.

CVSS3: 7.5
nvd
больше 5 лет назад

A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.

CVSS3: 7.5
debian
больше 5 лет назад

A reliance on cookies without validation/integrity check security vuln ...

CVSS3: 7.5
github
больше 5 лет назад

Rack allows Percent-encoded cookies to overwrite existing prefixed cookie names

CVSS3: 7.5
fstec
больше 5 лет назад

Уязвимость функции parse_cookies_header из utils.rb модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 77%
0.01067
Низкий

7.5 High

CVSS3

Уязвимость CVE-2020-8184