First published: Tue Sep 08 2009(Updated: )
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =2.1.0 | |
Rubyonrails Rails | =2.1.1 | |
Rubyonrails Rails | =2.1.2 | |
Rubyonrails Rails | =2.2.0 | |
Rubyonrails Rails | =2.2.1 | |
Rubyonrails Rails | =2.2.2 | |
Rubyonrails Rails | =2.3.2 | |
Rubyonrails Rails | =2.3.3 | |
rubygems/activesupport | >=2.3.0<2.3.4 | 2.3.4 |
rubygems/actionpack | >=2.1.0<2.2.3 | 2.2.3 |
rubygems/activesupport | >=2.1.0<2.2.3 | 2.2.3 |
rubygems/actionpack | >=2.3.0<2.3.4 | 2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.