FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2007-6077

This CVE name corresponds to:

Entered Topic
2007-11-27 rubygem-rails -- session-fixation vulnerability

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2007-6077
Phase Assigned(20071121)

Description

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.

References

Source Reference
CONFIRM http://dev.rubyonrails.org/changeset/8177
CONFIRM http://dev.rubyonrails.org/ticket/10048
CONFIRM http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release
CONFIRM http://docs.info.apple.com/article.html?artnum=307179
APPLE APPLE-SA-2007-12-17
CERT TA07-352A
BID 26598
VUPEN ADV-2007-4009
VUPEN ADV-2007-4238
SECUNIA 27781
SECUNIA 28136