Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2783-1 | librack-ruby security update |
Debian DSA |
DSA-2783-2 | librack-ruby regression update |
EUVD |
EUVD-2022-5763 | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time. |
Github GHSA |
GHSA-xc85-32mf-xpv8 | Rack arbitrary code execution via timing attack |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T14:18:09.586Z
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0263
No data.
Status : Deferred
Published: 2013-02-08T20:55:01.640
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0263
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA