Description
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
References
https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak
Mailing ListPatchThird Party Advisory
https://hackerone.com/reports/895727
ExploitPatchThird Party Advisory
https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html
Mailing ListThird Party Advisory
https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html
Mailing ListThird Party Advisory
https://usn.ubuntu.com/4561-1/
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2020-06-19T17:15:18.757
5 years agoLast modified
2023-02-16T19:24:38.140
2 years ago