The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0645 The activerecord-session_store (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
Github GHSA Github GHSA GHSA-cvw2-xj8r-mjf7 Activerecord-session_store Vulnerable to Timing Attack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T03:00:18.894Z

Reserved: 2021-03-05T00:00:00

Link: CVE-2019-25025

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-05T06:15:12.690

Modified: 2024-11-21T04:39:46.137

Link: CVE-2019-25025

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-12-22T01:40:00Z

Links: CVE-2019-25025 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses