6.8
CVSSv2

CVE-2007-6077

Published: 21/11/2007 Updated: 08/08/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote malicious users to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 1.2.4

Vendor Advisories

Debian Bug report logs - #452748 rails: CVE-2007-6077 unauthorized disclosure of information Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: ...
Debian Bug report logs - #452748 rails: CVE-2007-6077 unauthorized disclosure of information Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: ...