Lucene search

K
nvd[email protected]NVD:CVE-2015-7576
HistoryFeb 16, 2016 - 2:59 a.m.

CVE-2015-7576

2016-02-1602:59:00
CWE-254
web.nvd.nist.gov
2

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.019

Percentile

88.6%

The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.

Affected configurations

NVD
Node
rubyonrailsrailsMatch4.0.0-
OR
rubyonrailsrailsMatch4.0.0beta
OR
rubyonrailsrailsMatch4.0.0rc1
OR
rubyonrailsrailsMatch4.0.0rc2
OR
rubyonrailsrailsMatch4.0.1-
OR
rubyonrailsrailsMatch4.0.1rc1
OR
rubyonrailsrailsMatch4.0.1rc2
OR
rubyonrailsrailsMatch4.0.1rc3
OR
rubyonrailsrailsMatch4.0.1rc4
OR
rubyonrailsrailsMatch4.0.2
OR
rubyonrailsrailsMatch4.0.3
OR
rubyonrailsrailsMatch4.0.4
OR
rubyonrailsrailsMatch4.0.4rc1
OR
rubyonrailsrailsMatch4.0.5
OR
rubyonrailsrailsMatch4.0.6
OR
rubyonrailsrailsMatch4.0.6rc1
OR
rubyonrailsrailsMatch4.0.6rc2
OR
rubyonrailsrailsMatch4.0.6rc3
OR
rubyonrailsrailsMatch4.0.7
OR
rubyonrailsrailsMatch4.0.8
OR
rubyonrailsrailsMatch4.0.9
OR
rubyonrailsrailsMatch4.0.10
OR
rubyonrailsrailsMatch4.0.10rc1
OR
rubyonrailsrailsMatch4.1.0-
OR
rubyonrailsrailsMatch4.1.0beta1
OR
rubyonrailsrailsMatch4.1.0beta2
OR
rubyonrailsrailsMatch4.1.0rc1
OR
rubyonrailsrailsMatch4.1.0rc2
OR
rubyonrailsrailsMatch4.1.1
OR
rubyonrailsrailsMatch4.1.2
OR
rubyonrailsrailsMatch4.1.2rc1
OR
rubyonrailsrailsMatch4.1.2rc2
OR
rubyonrailsrailsMatch4.1.2rc3
OR
rubyonrailsrailsMatch4.1.3
OR
rubyonrailsrailsMatch4.1.4
OR
rubyonrailsrailsMatch4.1.5
OR
rubyonrailsrailsMatch4.1.6
OR
rubyonrailsrailsMatch4.1.6rc1
OR
rubyonrailsrailsMatch4.1.6rc2
OR
rubyonrailsrailsMatch4.1.7
OR
rubyonrailsrailsMatch4.1.7.1
OR
rubyonrailsrailsMatch4.1.8
OR
rubyonrailsrailsMatch4.1.9
OR
rubyonrailsrailsMatch4.1.9rc1
OR
rubyonrailsrailsMatch4.1.10
OR
rubyonrailsrailsMatch4.1.10rc1
OR
rubyonrailsrailsMatch4.1.10rc2
OR
rubyonrailsrailsMatch4.1.10rc3
OR
rubyonrailsrailsMatch4.1.10rc4
OR
rubyonrailsrailsMatch4.1.12
OR
rubyonrailsrailsMatch4.1.12rc1
OR
rubyonrailsrailsMatch4.1.13
OR
rubyonrailsrailsMatch4.1.13rc1
OR
rubyonrailsrailsMatch4.1.14
OR
rubyonrailsrailsMatch4.1.14rc1
OR
rubyonrailsrailsMatch4.1.14rc2
OR
rubyonrailsrailsMatch4.2.0
OR
rubyonrailsrailsMatch4.2.0beta1
OR
rubyonrailsrailsMatch4.2.0beta2
OR
rubyonrailsrailsMatch4.2.0beta3
OR
rubyonrailsrailsMatch4.2.0beta4
OR
rubyonrailsrailsMatch4.2.0rc1
OR
rubyonrailsrailsMatch4.2.0rc2
OR
rubyonrailsrailsMatch4.2.0rc3
OR
rubyonrailsrailsMatch4.2.1
OR
rubyonrailsrailsMatch4.2.1rc1
OR
rubyonrailsrailsMatch4.2.1rc2
OR
rubyonrailsrailsMatch4.2.1rc3
OR
rubyonrailsrailsMatch4.2.1rc4
OR
rubyonrailsrailsMatch4.2.2
OR
rubyonrailsrailsMatch4.2.3
OR
rubyonrailsrailsMatch4.2.3rc1
OR
rubyonrailsrailsMatch4.2.4
OR
rubyonrailsrailsMatch4.2.4rc1
OR
rubyonrailsrailsMatch4.2.5
OR
rubyonrailsrailsMatch4.2.5rc1
OR
rubyonrailsrailsMatch4.2.5rc2
OR
rubyonrailsrailsMatch5.0.0beta1
OR
rubyonrailsruby_on_railsRange3.2.22
OR
rubyonrailsruby_on_railsMatch4.0.10rc2
OR
rubyonrailsruby_on_railsMatch4.0.11
OR
rubyonrailsruby_on_railsMatch4.0.11.1
OR
rubyonrailsruby_on_railsMatch4.0.12
OR
rubyonrailsruby_on_railsMatch4.0.13
OR
rubyonrailsruby_on_railsMatch4.0.13rc1
OR
rubyonrailsruby_on_railsMatch4.1.11

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.019

Percentile

88.6%