Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5881-1 | rails security update |
EUVD |
EUVD-2024-0573 | Rails has possible Sensitive Session Information Leak in Active Storage |
Github GHSA |
GHSA-8h22-8cf7-hq6g | Rails has possible Sensitive Session Information Leak in Active Storage |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails rails |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rubyonrails
Rubyonrails rails |
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails rails |
|
| CPEs | cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rails
Rails rails |
|
| Metrics |
ssvc
|
Thu, 05 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat satellite |
|
| CPEs | cpe:/a:redhat:satellite:6.15::el8 | |
| Vendors & Products |
Redhat
Redhat satellite |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:41:06.989Z
Reserved: 2024-02-14T17:40:03.688Z
Link: CVE-2024-26144
Updated: 2024-08-01T23:59:32.578Z
Status : Analyzed
Published: 2024-02-27T16:15:46.970
Modified: 2025-02-14T15:26:42.917
Link: CVE-2024-26144
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA