The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
References
Configurations
History
21 Nov 2024, 01:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List | |
References | () http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s - Exploit, Patch | |
References | () http://secunia.com/advisories/35702 - Broken Link, Vendor Advisory | |
References | () http://support.apple.com/kb/HT4077 - Third Party Advisory | |
References | () http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest - Patch | |
References | () http://www.securityfocus.com/bid/35579 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.vupen.com/english/advisories/2009/1802 - Broken Link, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - Third Party Advisory, VDB Entry |
13 Feb 2024, 17:44
Type | Values Removed | Values Added |
---|---|---|
References | (APPLE) http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - Mailing List | |
References | (BID) http://www.securityfocus.com/bid/35579 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/35702 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2009/1802 - Broken Link, Patch, Vendor Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://support.apple.com/kb/HT4077 - Third Party Advisory | |
CPE | cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
First Time |
Rubyonrails
Rubyonrails ruby On Rails Apple Apple mac Os X Apple mac Os X Server |
Information
Published : 2009-07-10 15:30
Updated : 2024-11-21 01:04
NVD link : CVE-2009-2422
Mitre link : CVE-2009-2422
CVE.ORG link : CVE-2009-2422
JSON object : View
Products Affected
apple
- mac_os_x
- mac_os_x_server
rubyonrails
- ruby_on_rails
CWE
CWE-287
Improper Authentication