Lucene search

K
gentooGentoo FoundationGLSA-200409-08
HistorySep 03, 2004 - 12:00 a.m.

Ruby: CGI::Session creates files insecurely

2004-09-0300:00:00
Gentoo Foundation
security.gentoo.org
6

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%

Background

Ruby is an Object Oriented, interpreted scripting language used for many system scripting tasks. It can also be used for CGI web applications.

Description

The CGI::Session::FileStore implementation (and presumably CGI::Session::PStore), which allow data associated with a particular Session instance to be written to a file, writes to a file in /tmp with no regard for secure permissions. As a result, the file is left with whatever the default umask permissions are, which commonly would allow other local users to read the data from that session file.

Impact

Depending on the default umask, any data stored using these methods could be read by other users on the system.

Workaround

By changing the default umask on the system to not permit read access to other users (e.g. 0700), one can prevent these files from being readable by other users.

Resolution

All Ruby users should upgrade to the latest version:

 # emerge sync

 # emerge -pv ">=dev-lang/ruby-your_version"
 # emerge ">=dev-lang/ruby-your_version"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-lang/ruby< 1.8.2_pre2UNKNOWN

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.1%