First published: Fri May 03 2013(Updated: )
Ruby on Rails uses a HMAC for verifying the integrity of signed cookies. To prevent session hash tampering, a digest is calculated from the session with a server-side secret and inserted into the end of the cookie. It was found that CloudForms Management Engine (CFME) is using a statically defined secret, which is common across all deployments. A remote attacker could use this statically defined secret to perform a session tampering attack. External references: <a href="http://blog.phusion.nl/2013/01/04/securing-the-rails-session-secret/">http://blog.phusion.nl/2013/01/04/securing-the-rails-session-secret/</a> <a href="http://blog.mhartl.com/2008/08/15/a-security-issue-with-rails-secret-session-keys/">http://blog.mhartl.com/2008/08/15/a-security-issue-with-rails-secret-session-keys/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat CloudForms |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-959041 is classified as high due to the potential for session hash tampering.
To fix REDHAT-BUG-959041, ensure that your CloudForms Management Engine is updated to the latest version with the security patch applied.
REDHAT-BUG-959041 affects Red Hat CloudForms 3.0.4 Management Engine.
REDHAT-BUG-959041 describes a vulnerability related to session hash tampering through statically defined secrets in Ruby on Rails cookies.
The vendor for REDHAT-BUG-959041 is Red Hat.