3.7
CVSSv3

CVE-2015-7576

Published: 16/02/2016 Updated: 08/08/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.7 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails prior to 3.2.22.1, 4.0.x and 4.1.x prior to 4.1.14.1, 4.2.x prior to 4.2.5.1, and 5.x prior to 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote malicious users to bypass authentication by measuring timing differences.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 4.2.4

rubyonrails rails 4.2.3

rubyonrails rails 4.2.1

rubyonrails rails 4.2.0

rubyonrails rails 4.1.14

rubyonrails rails 4.1.10

rubyonrails rails 4.1.7.1

rubyonrails rails 4.1.7

rubyonrails rails 4.1.2

rubyonrails rails 4.1.0

rubyonrails ruby on rails 4.0.13

rubyonrails rails 4.0.10

rubyonrails rails 4.0.9

rubyonrails rails 4.0.5

rubyonrails rails 4.0.4

rubyonrails rails 4.0.1

rubyonrails rails 4.0.0

rubyonrails rails 4.2.5

rubyonrails rails 4.1.12

rubyonrails ruby on rails 4.1.11

rubyonrails rails 4.1.9

rubyonrails rails 4.1.8

rubyonrails rails 4.1.4

rubyonrails rails 4.1.3

rubyonrails ruby on rails 4.0.10

rubyonrails rails 4.0.6

rubyonrails rails 4.2.2

rubyonrails rails 4.1.13

rubyonrails rails 4.1.6

rubyonrails rails 4.1.1

rubyonrails ruby on rails 4.0.12

rubyonrails rails 4.0.8

rubyonrails rails 4.0.7

rubyonrails rails 4.0.3

rubyonrails rails 4.0.2

rubyonrails rails 5.0.0

rubyonrails rails 4.1.5

rubyonrails ruby on rails 4.0.11.1

rubyonrails ruby on rails 4.0.11

rubyonrails ruby on rails

Vendor Advisories

Debian Bug report logs - #790486 rails: CVE-2015-3226: XSS in ActiveSupport::JSONencode Package: src:rails; Maintainer for src:rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 29 Jun 2015 18:36:01 UTC Sever ...
Debian Bug report logs - #790487 rails: CVE-2015-3227: Possible Denial of Service attack in Active Support Package: src:rails; Maintainer for src:rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 29 Jun 2015 1 ...
Multiple security issues have been discovered in the Ruby on Rails web application development framework, which may result in denial of service, cross-site scripting, information disclosure or bypass of input validation For the stable distribution (jessie), these problems have been fixed in version 2:418-1+deb8u1 For the unstable distribution ( ...
A flaw was found in the way the Action Controller component compared user names and passwords when performing HTTP basic authentication Time taken to compare strings could differ depending on input, possibly allowing a remote attacker to determine valid user names and passwords using a timing attack ...