Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-32441

Опубликовано: 07 мая 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 4.2

Описание

Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the Rack::Session::Pool middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the Rack::Session::Pool middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio...

РелизСтатусПримечание
devel

released

3.1.16-0.1
esm-apps/bionic

released

1.6.4-4ubuntu0.2+esm8
esm-apps/focal

released

2.0.7-2ubuntu0.1+esm7
esm-apps/jammy

released

2.1.4-5ubuntu1.1+esm2
esm-apps/xenial

released

1.6.4-3ubuntu0.2+esm8
esm-infra-legacy/trusty

released

1.5.2-3+deb8u3ubuntu1~esm10
focal

ignored

end of standard support, was needed
jammy

needed

noble

released

2.2.7-1ubuntu0.3
oracular

released

2.2.7-1.1ubuntu0.2

Показывать по

EPSS

Процентиль: 10%
0.00038
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.2
redhat
3 месяца назад

Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio...

CVSS3: 4.2
nvd
3 месяца назад

Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessions

CVSS3: 4.2
debian
3 месяца назад

Rack is a modular Ruby web server interface. Prior to version 2.2.14, ...

CVSS3: 4.2
github
3 месяца назад

Rack session gets restored after deletion

CVSS3: 4.2
fstec
3 месяца назад

Уязвимость интерфейса модуля Rack интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 10%
0.00038
Низкий

4.2 Medium

CVSS3