Package: rails
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for rails.

CVE-2007-6077[0]:
| The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as
| used in Ruby on Rails, removes the :cookie_only attribute from the
| DEFAULT_SESSION_OPTIONS constant, which effectively causes :cookie_only to 
only
| be applied to the first instantiation of CgiRequest, which allows remote
| attackers to conduct session fixation attacks. NOTE: this is due to an
| incomplete fix for CVE-2007-5380

If you fix this vulnerability please also include the CVE id
in your changelog entry.

Since this is caused by an incomplete fix for CVE-2007-5380 I set the severity 
to grave.

There is a patch available on:
http://dev.rubyonrails.org/ticket/10048

For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6077

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgp009BL6dhbq.pgp
Description: PGP signature

Reply via email to