Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0214-1

Опубликовано: 12 фев. 2020
Источник: suse-cvrf

Описание

Security update for rubygem-rack

This update for rubygem-rack to version 2.0.8 fixes the following issues:

  • CVE-2018-16471: Fixed a cross-site scripting (XSS) flaw via the scheme method on Rack::Request (bsc#1116600).
  • CVE-2019-16782: Fixed a possible information leak and session hijack vulnerability (bsc#1159548).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
ruby2.5-rubygem-rack-2.0.8-lp151.3.3.1
ruby2.5-rubygem-rack-doc-2.0.8-lp151.3.3.1
ruby2.5-rubygem-rack-testsuite-2.0.8-lp151.3.3.1

Описание

There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.


Затронутые продукты
openSUSE Leap 15.1:ruby2.5-rubygem-rack-2.0.8-lp151.3.3.1
openSUSE Leap 15.1:ruby2.5-rubygem-rack-doc-2.0.8-lp151.3.3.1
openSUSE Leap 15.1:ruby2.5-rubygem-rack-testsuite-2.0.8-lp151.3.3.1

Ссылки

Описание

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.


Затронутые продукты
openSUSE Leap 15.1:ruby2.5-rubygem-rack-2.0.8-lp151.3.3.1
openSUSE Leap 15.1:ruby2.5-rubygem-rack-doc-2.0.8-lp151.3.3.1
openSUSE Leap 15.1:ruby2.5-rubygem-rack-testsuite-2.0.8-lp151.3.3.1

Ссылки