First published: Fri Mar 05 2021(Updated: )
The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782. ## Recommendation This has been fixed in version 2.0.0. All users are advised to update to this version or later.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.1.3 | ||
rubygems/activerecord-session_store | <=1.1.3 | 2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25025 is a vulnerability in the activerecord-session_store component for Ruby on Rails that allows remote attackers to exploit timing discrepancies to determine the validity of guessed session IDs.
CVE-2019-25025 has a severity rating of 5.3 (Medium).
The activerecord-session_store component through version 1.1.3 for Ruby on Rails is affected.
To fix CVE-2019-25025, upgrade the activerecord-session_store component to version 2.0.0 or newer.
More information about CVE-2019-25025 can be found at the following references: [link1], [link2], [link3].