First published: Fri Jul 10 2009(Updated: )
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rails | <2.3.3 | 2.3.3 |
Ruby on Rails | =2.3.3 | |
Ruby on Rails | <2.3.3 | |
macOS Yosemite | >=10.6.0<10.6.3 | |
macOS Yosemite | =10.5.8 | |
Apple Mac OS X Server | >=10.6.0<10.6.3 | |
Apple Mac OS X Server | =10.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-2422 is considered to be moderate as it allows attackers to bypass authentication under certain conditions.
To fix CVE-2009-2422, you should upgrade to Ruby on Rails version 2.3.3 or later.
CVE-2009-2422 affects Ruby on Rails versions before 2.3.3, particularly its digest authentication functionality.
CVE-2009-2422 was published on July 28, 2009.
Context-dependent attackers can exploit CVE-2009-2422 to bypass authentication in applications using affected versions of Ruby on Rails.