[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112994

 
 

909

 
 

87812

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-6077Date: (C)2007-11-21   (M)2018-02-19


The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 8.6
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-26598
SECUNIA-27781
SECUNIA-28136
ADV-2007-4009
ADV-2007-4238
APPLE-SA-2007-12-17
TA07-352A
http://dev.rubyonrails.org/changeset/8177
http://dev.rubyonrails.org/ticket/10048
http://docs.info.apple.com/article.html?artnum=307179
http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release

CPE    1
cpe:/a:rubyonrails:rails:1.2.4
CWE    1
CWE-362

© SecPod Technologies