CVE-2009-2422Improper Authentication in Ruby ON Rails

Severity
9.8CRITICALNVD
EPSS
0.4%
top 39.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 10
Latest updateOct 24

Description

The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

RubyGemsrubyonrails/rails< 2.3.3
Debianrubyonrails/rails< 2.3.5-1+3
NVDapple/mac_os_x10.6.010.6.3+1
NVDapple/mac_os_x_server10.6.010.6.3+1

Patches

🔴Vulnerability Details

4
OSV
rails vulnerable to improper authentication2017-10-24
GHSA
rails vulnerable to improper authentication2017-10-24
CVEList
CVE-2009-2422: The example code for the digest authentication functionality (http_authentication2009-07-10
OSV
CVE-2009-2422: The example code for the digest authentication functionality (http_authentication2009-07-10

📋Vendor Advisories

2
Debian
CVE-2009-2422: rails - The example code for the digest authentication functionality (http_authenticatio...2009
Red Hat
rubygem-actionpack: authenticate_with_http_digest authentication bypass

💬Community

1
Bugzilla
CVE-2009-2422 rubygem-actionpack: authenticate_with_http_digest authentication bypass2009-07-03
CVE-2009-2422 — Improper Authentication | cvebase