4.3
CVSSv2

CVE-2020-15237

Published: 05/10/2020 Updated: 19/10/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the malicious user to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

shrinerb shrine