logo

CVE-2021-28680 devise_masquerade

Package

Manager: gem
Name: devise_masquerade
Vulnerable Version: >=0 <1.3.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00325 pctl0.54896

Details

Improper Privilege Management in devise_masquerade The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side `secret_key_base` value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When `devise_masquerade` is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.

Metadata

Created: 2021-12-08T19:55:30Z
Modified: 2023-09-05T21:51:12Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-25f5-gc4h-hc22/GHSA-25f5-gc4h-hc22.json
CWE IDs: ["CWE-269"]
Alternative ID: GHSA-25f5-gc4h-hc22
Finding: F159
Auto approve: 1