First published: Tue Sep 08 2009(Updated: )
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activesupport | >=2.3.0<2.3.4 | 2.3.4 |
rubygems/actionpack | >=2.1.0<2.2.3 | 2.2.3 |
rubygems/activesupport | >=2.1.0<2.2.3 | 2.2.3 |
rubygems/actionpack | >=2.3.0<2.3.4 | 2.3.4 |
Ruby on Rails | =2.1.0 | |
Ruby on Rails | =2.1.1 | |
Ruby on Rails | =2.1.2 | |
Ruby on Rails | =2.2.0 | |
Ruby on Rails | =2.2.1 | |
Ruby on Rails | =2.2.2 | |
Ruby on Rails | =2.3.2 | |
Ruby on Rails | =2.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3086 is classified as a medium severity vulnerability due to the potential for information disclosure and remote code execution via crafted requests.
To fix CVE-2009-3086, upgrade Ruby on Rails to version 2.3.4 or higher.
CVE-2009-3086 affects Ruby on Rails versions 2.1.0 through 2.2.2 and all 2.3.x versions prior to 2.3.4.
Yes, CVE-2009-3086 can be exploited remotely, allowing attackers to forge message-digest signatures.
The impact of CVE-2009-3086 includes the potential for unauthorized access and manipulation of secured cookie data.