5
CVSSv2

CVE-2019-25025

Published: 05/03/2021 Updated: 15/03/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The activerecord-session_store (aka Active Record Session Store) component up to and including 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails active record session store

Vendor Advisories

The activerecord-session_store (aka Active Record Session Store) component through 113 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time Th ...

Github Repositories

Active Record's Session Store extracted from Rails

Active Record Session Store A session store backed by an Active Record class A default class is provided, but any object duck-typing to an Active Record Session class with text session_id and data attributes is sufficient Installation Include this gem into your Gemfile: gem 'activerecord-session_store' Run the migration generat

Active Record Session Store A session store backed by an Active Record class A default class is provided, but any object duck-typing to an Active Record Session class with text session_id and data attributes is sufficient Installation Include this gem into your Gemfile: gem 'activerecord-session_store' Run the migration generat