CVE-2015-7576 — Covert Timing Channel in Project Actionpack
Severity
3.7LOWNVD
EPSS
1.6%
top 18.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 16
Latest updateOct 24
Description
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4
Affected Packages4 packages
🔴Vulnerability Details
4📋Vendor Advisories
2💬Community
5Bugzilla▶
CVE-2015-7576 rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller↗2016-01-26
Bugzilla▶
CVE-2015-7576 rubygem-activesupport: rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller [fedora-all]↗2016-01-26
Bugzilla▶
CVE-2015-7576 rubygem-actionpack: Timing attack vulnerability in basic authentication in Action Controller [fedora-all]↗2016-01-26
Bugzilla▶
CVE-2015-7576 rubygem-rails: Timing attack vulnerability in basic authentication in Action Controller [fedora-all]↗2016-01-26