Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWN2dzIteGo4ci1tamY3

Activerecord-session_store Vulnerable to Timing Attack

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

Recommendation

This has been fixed in version 2.0.0. All users are advised to update to this version or later.

Permalink: https://github.com/advisories/GHSA-cvw2-xj8r-mjf7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWN2dzIteGo4ci1tamY3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: 8 months ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-cvw2-xj8r-mjf7, CVE-2019-25025
References: Repository: https://github.com/rails/activerecord-session_store
Blast Radius: 18.5

Affected Packages

rubygems:activerecord-session_store
Dependent packages: 19
Dependent repositories: 3,063
Downloads: 35,655,554 total
Affected Version Ranges: <= 1.1.3
Fixed in: 2.0.0
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.1.2, 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.1.3
All unaffected versions: 2.0.0, 2.1.0