Количество 13
Количество 13

CVE-2025-32441
Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio...

CVE-2025-32441
Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio...

CVE-2025-32441
Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessions
CVE-2025-32441
Rack is a modular Ruby web server interface. Prior to version 2.2.14, ...
GHSA-vpfw-47h7-xj4g
Rack session gets restored after deletion

BDU:2025-07359
Уязвимость интерфейса модуля Rack интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2025:02564-1
Security update for rmt-server

SUSE-SU-2025:02429-1
Security update for rmt-server

SUSE-SU-2025:02330-1
Security update for rmt-server

SUSE-SU-2025:02329-1
Security update for rmt-server

SUSE-SU-2025:01586-2
Security update for rubygem-rack

SUSE-SU-2025:01586-1
Security update for rubygem-rack

ROS-20250619-01
Множественные уязвимости rubygem-rack
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-32441 Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio... | CVSS3: 4.2 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-32441 Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessio... | CVSS3: 4.2 | 0% Низкий | 3 месяца назад |
![]() | CVE-2025-32441 Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. Rack session middleware prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. Version 2.2.14 contains a patch for the issue. Some other mitigations are available. Either ensure the application invalidates sessions | CVSS3: 4.2 | 0% Низкий | 3 месяца назад |
CVE-2025-32441 Rack is a modular Ruby web server interface. Prior to version 2.2.14, ... | CVSS3: 4.2 | 0% Низкий | 3 месяца назад | |
GHSA-vpfw-47h7-xj4g Rack session gets restored after deletion | CVSS3: 4.2 | 0% Низкий | 3 месяца назад | |
![]() | BDU:2025-07359 Уязвимость интерфейса модуля Rack интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.2 | 0% Низкий | 3 месяца назад |
![]() | SUSE-SU-2025:02564-1 Security update for rmt-server | 8 дней назад | ||
![]() | SUSE-SU-2025:02429-1 Security update for rmt-server | 18 дней назад | ||
![]() | SUSE-SU-2025:02330-1 Security update for rmt-server | 23 дня назад | ||
![]() | SUSE-SU-2025:02329-1 Security update for rmt-server | 23 дня назад | ||
![]() | SUSE-SU-2025:01586-2 Security update for rubygem-rack | 2 месяца назад | ||
![]() | SUSE-SU-2025:01586-1 Security update for rubygem-rack | 3 месяца назад | ||
![]() | ROS-20250619-01 Множественные уязвимости rubygem-rack | CVSS3: 7.5 | около 2 месяцев назад |
Уязвимостей на страницу