Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-26144
HistoryFeb 27, 2024 - 3:44 p.m.

CVE-2024-26144 Possible Sensitive Session Information Leak in Active Storage

2024-02-2715:44:04
CWE-200
GitHub_M
www.cve.org
1
cve-2024-26144
active storage
rails
session information
information leak
vulnerability
fix
version 5.2.0
version 7.0.8.1
version 6.1.7.7

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user’s session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.

CNA Affected

[
  {
    "vendor": "rails",
    "product": "rails",
    "versions": [
      {
        "version": ">= 5.2.0, < 6.1.7.7",
        "status": "affected"
      },
      {
        "version": ">= 7.0.0, < 7.0.8.1",
        "status": "affected"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%