Rack arbitrary code execution via timing attack
Moderate severity
GitHub Reviewed
Published
May 5, 2022
to the GitHub Advisory Database
•
Updated Feb 13, 2023
Package
Affected versions
>= 1.5.0, < 1.5.2
>= 1.4.0, < 1.4.5
>= 1.3.0, < 1.3.10
>= 1.2.0, < 1.2.8
>= 1.1.0, < 1.1.6
Patched versions
1.5.2
1.4.5
1.3.10
1.2.8
1.1.6
Description
Published by the National Vulnerability Database
Feb 8, 2013
Published to the GitHub Advisory Database
May 5, 2022
Reviewed
Jun 17, 2022
Last updated
Feb 13, 2023
Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
References