Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-26144
HistoryFeb 27, 2024 - 3:44 p.m.

CVE-2024-26144 Possible Sensitive Session Information Leak in Active Storage

2024-02-2715:44:04
CWE-200
GitHub_M
github.com
4
cve-2024-26144
active storage
sensitive information
session leak
cookie header
information leak
vulnerability
fixed version

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.6

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user’s session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:*"
    ],
    "vendor": "rails",
    "product": "rails",
    "versions": [
      {
        "status": "affected",
        "version": "5.2.0",
        "lessThan": "7.1.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.6

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial