CVE-2024-26144
CVSS V2 None
CVSS V3 None
Description
Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.
Overview
- CVE ID
- CVE-2024-26144
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-02-27T15:44:04.166Z
- Last Modified Date
- 2024-02-27T15:44:04.166Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g | x_refsource_CONFIRM |
https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433 | x_refsource_MISC |
https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3 | x_refsource_MISC |
https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945 | x_refsource_MISC |
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml | x_refsource_MISC |
https://security.netapp.com/advisory/ntap-20240510-0013/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-26144 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26144 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 00:25:04 | Added to TrackCVE |