CVE-2007-6077Race Condition in Rails

CWE-362Race Condition11 documents6 sources
Severity
6.8MEDIUMNVD
EPSS
3.3%
top 12.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 21
Latest updateOct 24

Description

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

RubyGemsrubyonrails/rails< 1.2.6
Debianrubyonrails/rails< 1.2.6-1+3

Patches

🔴Vulnerability Details

4
GHSA
session fixation protection mechanism in cgi_process.rb in Rails2017-10-24
OSV
session fixation protection mechanism in cgi_process.rb in Rails2017-10-24
OSV
CVE-2007-6077: The session fixation protection mechanism in cgi_process2007-11-21
CVEList
CVE-2007-6077: The session fixation protection mechanism in cgi_process2007-11-21

📋Vendor Advisories

1
Debian
CVE-2007-6077: rails - The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as u...2007
CVE-2007-6077 — Race Condition in Rubyonrails Rails | cvebase