RubyGem Rack 输入验证错误漏洞
CNNVD-ID编号 | CNNVD-202006-1412 | CVE编号 | CVE-2020-8184 |
发布时间 | 2020-06-19 | 更新时间 | 2020-11-10 |
漏洞类型 | 输入验证错误 | 漏洞来源 | N/A |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
漏洞介绍
RubyGem Rack是一款使用Ruby编程语言开发的Web服务器和Web应用程序之间的模块化接口。
RubyGem Rack 2.2.3之前版本和2.1.4之前版本中存在安全漏洞。攻击者可利用该漏洞控制以secure或host-only为前缀的cookie。
漏洞补丁
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
https://github.com/rack/rack
参考网址
来源:UBUNTU
链接:https://usn.ubuntu.com/4561-1/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html
来源:MISC
链接:https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak
来源:MISC
链接:https://hackerone.com/reports/895727
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2359/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3414/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-8184
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3703/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Rack-privilege-escalation-via-Cookie-Prefix-32796
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159425/Ubuntu-Security-Notice-USN-4561-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3691/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3928/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159724/Red-Hat-Security-Advisory-2020-4366-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3841/
受影响实体
暂无
信息来源
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202006-1412

评论