7.5
CVSSv2

CVE-2015-1820

Published: 09/08/2017 Updated: 21/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

REST client for Ruby (aka rest-client) prior to 1.8.0 allows remote malicious users to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rest-client project rest-client

Vendor Advisories

Debian Bug report logs - #781238 ruby-rest-client: CVE-2015-1820 Package: ruby-rest-client; Maintainer for ruby-rest-client is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-rest-client is src:ruby-rest-client (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm ...
REST client for Ruby (aka rest-client) before 180 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect ...