CVE-2009-2422

The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:04

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List
References () http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s - Exploit, Patch () http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s - Exploit, Patch
References () http://secunia.com/advisories/35702 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35702 - Broken Link, Vendor Advisory
References () http://support.apple.com/kb/HT4077 - Third Party Advisory () http://support.apple.com/kb/HT4077 - Third Party Advisory
References () http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest - Patch () http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest - Patch
References () http://www.securityfocus.com/bid/35579 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35579 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/1802 - Broken Link, Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1802 - Broken Link, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - Third Party Advisory, VDB Entry

13 Feb 2024, 17:44

Type Values Removed Values Added
References (APPLE) http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - (APPLE) http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List
References (BID) http://www.securityfocus.com/bid/35579 - Patch (BID) http://www.securityfocus.com/bid/35579 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/35702 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35702 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2009/1802 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1802 - Broken Link, Patch, Vendor Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - Third Party Advisory, VDB Entry
References (CONFIRM) http://support.apple.com/kb/HT4077 - (CONFIRM) http://support.apple.com/kb/HT4077 - Third Party Advisory
CPE cpe:2.3:a:david_hansson:ruby_on_rails:2.3.3:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
CVSS v2 : 7.5
v3 : unknown
v2 : 7.5
v3 : 9.8
First Time Rubyonrails
Rubyonrails ruby On Rails
Apple
Apple mac Os X
Apple mac Os X Server

Information

Published : 2009-07-10 15:30

Updated : 2024-11-21 01:04


NVD link : CVE-2009-2422

Mitre link : CVE-2009-2422

CVE.ORG link : CVE-2009-2422


JSON object : View

Products Affected

apple

  • mac_os_x
  • mac_os_x_server

rubyonrails

  • ruby_on_rails
CWE
CWE-287

Improper Authentication