7.5
CVSSv3

CVE-2020-8184

Published: 19/06/2020 Updated: 16/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an malicious user to forge a secure or host-only cookie prefix.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rack project rack

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 18.04

Vendor Advisories

Synopsis Important: Satellite 68 release Type/Severity Security Advisory: Important Topic An update is now available for Red Hat Satellite 68 for RHEL 7Red Hat Product Security has rated this update as having a security impactof Important A Common Vulnerability Scoring System (CVSS) base score,which giv ...
Debian Bug report logs - #963477 ruby-rack: CVE-2020-8184 Package: src:ruby-rack; Maintainer for src:ruby-rack is Debian Ruby Extras Maintainers &lt;pkg-ruby-extras-maintainers@listsaliothdebianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Mon, 22 Jun 2020 07:03:01 UTC Severity: important Tags: se ...

Github Repositories

Demo for Cloud Native Buildpacks Office Hours at Kubecon EU 2022

Cloud Native Buildpacks Office Hours Demo - Kubecon EU 2022 Here we build a simple Ruby app using Paketo Buildpacks We store the buildpack-generated Software Bill of Materials (SBOM) files when we build We scan the SBOM files using Grype and see that one of our dependencies has a CVE We then update the dependency, rebuild, and scan the new SBOM to see that it has no known vu