Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWN2dzIteGo4ci1tamY3
Activerecord-session_store Vulnerable to Timing Attack
The activerecord-session_store
(aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
Recommendation
This has been fixed in version 2.0.0. All users are advised to update to this version or later.
Permalink: https://github.com/advisories/GHSA-cvw2-xj8r-mjf7JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWN2dzIteGo4ci1tamY3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: 8 months ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-cvw2-xj8r-mjf7, CVE-2019-25025
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-25025
- https://github.com/rails/activerecord-session_store/pull/151
- https://rubygems.org/gems/activerecord-session_store
- https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160
- https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0
- https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml
- https://github.com/advisories/GHSA-cvw2-xj8r-mjf7
Blast Radius: 18.5
Affected Packages
rubygems:activerecord-session_store
Dependent packages: 19Dependent repositories: 3,063
Downloads: 35,655,554 total
Affected Version Ranges: <= 1.1.3
Fixed in: 2.0.0
All affected versions: 0.0.1, 0.1.0, 0.1.1, 0.1.2, 1.0.0, 1.1.0, 1.1.1, 1.1.2, 1.1.3
All unaffected versions: 2.0.0, 2.1.0