// For flags

CVE-2021-41263

Secure/signed cookies share secrets between sites in rails_multisite

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

rails_multisite provides multi-db support for Rails applications. In affected versions this vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.

rails_multisite proporciona soporte multidb para las aplicaciones Rails. En las versiones afectadas, esta vulnerabilidad afecta a cualquier aplicación Rails usando "rails_multisite" junto con las cookies firmadas/cifradas de Rails. Dependiendo de cómo la aplicación haga uso de estas cookies, puede ser posible que un atacante reuse las cookies en diferentes "sites" dentro de una aplicación Rails multisitio. El problema ha sido parcheado en la versión v4 de la gema "rails_multisite". Tenga en cuenta que esta actualización invalidará todas las cookies firmadas/cifradas anteriores. El impacto de esta no comprobación variará en función de la arquitectura de la aplicación

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2021-11-15 CVE Published
  • 2023-06-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-327: Use of a Broken or Risky Cryptographic Algorithm
  • CWE-565: Reliance on Cookies without Validation and Integrity Checking
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Discourse
Search vendor "Discourse"
Rails Multisite
Search vendor "Discourse" for product "Rails Multisite"
< 4.0.0
Search vendor "Discourse" for product "Rails Multisite" and version " < 4.0.0"
ruby
Affected