CVE Vulnerabilities

CVE-2019-25025

Published: Mar 05, 2021 | Modified: Mar 15, 2021
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
MEDIUM

The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

Affected Software

Name Vendor Start Version End Version
Active_record_session_store Rubyonrails * 1.1.3 (including)
Red Hat Satellite 6.10 for RHEL 7 RedHat tfm-rubygem-activerecord-session_store-0:2.0.0-1.el7sat *
Ruby-activerecord-session-store Ubuntu bionic *
Ruby-activerecord-session-store Ubuntu trusty *
Ruby-activerecord-session-store Ubuntu xenial *

References