CVE-2020-8184
rubygem-rack: percent-encoded cookies can be used to overwrite existing prefixed cookie names
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
Se presenta una dependencia de las cookies sin vulnerabilidad de seguridad de control de validaciĆ³n e integridad en rack versiones anteriores a 2.2.3, rack versiones anteriores a 2.1.4, que hace posible a un atacante forjar un prefijo de cookie seguro o solo de host
A flaw was found in rubygem-rack. An attacker may be able to trick a vulnerable application into processing an insecure (non-SSL) or cross-origin request if they can gain the ability to write arbitrary cookies that are sent to the application. The highest threat from this vulnerability is to data integrity.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-28 CVE Reserved
- 2020-06-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-10-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-784: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
- CWE-807: Reliance on Untrusted Inputs in a Security Decision
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2023/01/msg00038.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://hackerone.com/reports/895727 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak | 2023-02-16 |
URL | Date | SRC |
---|---|---|
https://usn.ubuntu.com/4561-1 | 2023-02-16 | |
https://access.redhat.com/security/cve/CVE-2020-8184 | 2020-10-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1849141 | 2020-10-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rack Project Search vendor "Rack Project" | Rack Search vendor "Rack Project" for product "Rack" | < 2.1.4 Search vendor "Rack Project" for product "Rack" and version " < 2.1.4" | - |
Affected
| ||||||
Rack Project Search vendor "Rack Project" | Rack Search vendor "Rack Project" for product "Rack" | >= 2.2.0 < 2.2.3 Search vendor "Rack Project" for product "Rack" and version " >= 2.2.0 < 2.2.3" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
|