Логотип exploitDog
bind:CVE-2019-16782
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16782

Количество 7

Количество 7

ubuntu логотип

CVE-2019-16782

около 6 лет назад

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 6.3
EPSS: Низкий
redhat логотип

CVE-2019-16782

около 6 лет назад

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2019-16782

около 6 лет назад

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 6.3
EPSS: Низкий
debian логотип

CVE-2019-16782

около 6 лет назад

There's a possible information leak / session hijack vulnerability in ...

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-hrqr-hxpp-chr3

около 6 лет назад

Possible Information Leak / Session Hijack Vulnerability in Rack

CVSS3: 6.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0214-1

почти 6 лет назад

Security update for rubygem-rack

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0359-1

около 6 лет назад

Security update for rubygem-rack

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-16782

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 6.3
2%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-16782

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 5.9
2%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-16782

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

CVSS3: 6.3
2%
Низкий
около 6 лет назад
debian логотип
CVE-2019-16782

There's a possible information leak / session hijack vulnerability in ...

CVSS3: 6.3
2%
Низкий
около 6 лет назад
github логотип
GHSA-hrqr-hxpp-chr3

Possible Information Leak / Session Hijack Vulnerability in Rack

CVSS3: 6.3
2%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0214-1

Security update for rubygem-rack

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0359-1

Security update for rubygem-rack

около 6 лет назад

Уязвимостей на страницу