Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-26144", "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "state": "PUBLISHED", "assignerShortName": "GitHub_M", "dateReserved": "2024-02-14T17:40:03.688Z", "datePublished": "2024-02-27T15:44:04.166Z", "dateUpdated": "2025-02-13T17:41:06.989Z"}, "containers": {"cna": {"title": "Possible Sensitive Session Information Leak in Active Storage", "problemTypes": [{"descriptions": [{"cweId": "CWE-200", "lang": "en", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "type": "CWE"}]}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}}], "references": [{"name": "https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g", "tags": ["x_refsource_CONFIRM"], "url": "https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g"}, {"name": "https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433", "tags": ["x_refsource_MISC"], "url": "https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433"}, {"name": "https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3", "tags": ["x_refsource_MISC"], "url": "https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3"}, {"name": "https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945", "tags": ["x_refsource_MISC"], "url": "https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945"}, {"name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml", "tags": ["x_refsource_MISC"], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml"}, {"url": "https://security.netapp.com/advisory/ntap-20240510-0013/"}], "affected": [{"vendor": "rails", "product": "rails", "versions": [{"version": ">= 5.2.0, < 6.1.7.7", "status": "affected"}, {"version": ">= 7.0.0, < 7.0.8.1", "status": "affected"}]}], "providerMetadata": {"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M", "dateUpdated": "2024-06-10T16:07:14.017Z"}, "descriptions": [{"lang": "en", "value": "Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7."}], "source": {"advisory": "GHSA-8h22-8cf7-hq6g", "discovery": "UNKNOWN"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T23:59:32.578Z"}, "title": "CVE Program Container", "references": [{"name": "https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g", "tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g"}, {"name": "https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433", "tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433"}, {"name": "https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3", "tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3"}, {"name": "https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945", "tags": ["x_refsource_MISC", "x_transferred"], "url": "https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945"}, {"name": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml", "tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml"}, {"url": "https://security.netapp.com/advisory/ntap-20240510-0013/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "rails", "product": "rails", "cpes": ["cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "5.2.0", "status": "affected", "lessThan": "7.1.0", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-08-09T14:01:13.600938Z", "id": "CVE-2024-26144", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-09T14:45:52.412Z"}}]}, "dataVersion": "5.1"}