logo

CVE-2013-0263 rack

Package

Manager: gem
Name: rack
Vulnerable Version: >=1.5.0 <1.5.2 || >=1.4.0 <1.4.5 || >=1.3.0 <1.3.10 || >=1.2.0 <1.2.8 || >=1.1.0 <1.1.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.05283 pctl0.89632

Details

Rack arbitrary code execution via timing attack Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

Metadata

Created: 2022-05-05T02:48:42Z
Modified: 2022-06-17T21:30:05Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xc85-32mf-xpv8/GHSA-xc85-32mf-xpv8.json
CWE IDs: []
Alternative ID: GHSA-xc85-32mf-xpv8
Finding: F063
Auto approve: 1