Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2783-1 librack-ruby security update
Debian DSA Debian DSA DSA-2783-2 librack-ruby regression update
EUVD EUVD EUVD-2022-5763 Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
Github GHSA Github GHSA GHSA-xc85-32mf-xpv8 Rack arbitrary code execution via timing attack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.07962}

epss

{'score': 0.05283}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T14:18:09.586Z

Reserved: 2012-12-06T00:00:00

Link: CVE-2013-0263

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-02-08T20:55:01.640

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-0263

cve-icon Redhat

Severity : Moderate

Publid Date: 2013-02-08T00:00:00Z

Links: CVE-2013-0263 - Bugzilla

cve-icon OpenCVE Enrichment

No data.