Description
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
References
https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak
https://hackerone.com/reports/895727
https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html
https://usn.ubuntu.com/4561-1/
https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak
https://hackerone.com/reports/895727
https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html
https://usn.ubuntu.com/4561-1/
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 · High
Information
Source identifier
Vulnerability status
Modified
Published
2020-06-19T15:15:18.757Z
5 years agoLast modified
2024-11-21T04:38:27.507Z
1 year ago