CVE-2013-0263

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
http://rack.github.com/ Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-0686.html
http://secunia.com/advisories/52033 Vendor Advisory
http://secunia.com/advisories/52134 Vendor Advisory
http://secunia.com/advisories/52774
http://www.debian.org/security/2013/dsa-2783
http://www.osvdb.org/89939
https://bugzilla.redhat.com/show_bug.cgi?id=909071
https://gist.github.com/codahale/f9f3781f7b54985bee94
https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07
https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11
https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J
https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
https://puppet.com/security/cve/cve-2013-0263
https://twitter.com/coda/statuses/299732877745197056
http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html
http://rack.github.com/ Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2013-0686.html
http://secunia.com/advisories/52033 Vendor Advisory
http://secunia.com/advisories/52134 Vendor Advisory
http://secunia.com/advisories/52774
http://www.debian.org/security/2013/dsa-2783
http://www.osvdb.org/89939
https://bugzilla.redhat.com/show_bug.cgi?id=909071
https://gist.github.com/codahale/f9f3781f7b54985bee94
https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07
https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11
https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J
https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ
https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ
https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ
https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ
https://puppet.com/security/cve/cve-2013-0263
https://twitter.com/coda/statuses/299732877745197056
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rack_project:rack:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.5.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:rack_project:rack:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.4.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:rack_project:rack:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.3.9:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:rack_project:rack:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.2.7:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:rack_project:rack:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rack_project:rack:1.1.6:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html - () http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html -
References () http://rack.github.com/ - Vendor Advisory () http://rack.github.com/ - Vendor Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0686.html - () http://rhn.redhat.com/errata/RHSA-2013-0686.html -
References () http://secunia.com/advisories/52033 - Vendor Advisory () http://secunia.com/advisories/52033 - Vendor Advisory
References () http://secunia.com/advisories/52134 - Vendor Advisory () http://secunia.com/advisories/52134 - Vendor Advisory
References () http://secunia.com/advisories/52774 - () http://secunia.com/advisories/52774 -
References () http://www.debian.org/security/2013/dsa-2783 - () http://www.debian.org/security/2013/dsa-2783 -
References () http://www.osvdb.org/89939 - () http://www.osvdb.org/89939 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=909071 - () https://bugzilla.redhat.com/show_bug.cgi?id=909071 -
References () https://gist.github.com/codahale/f9f3781f7b54985bee94 - () https://gist.github.com/codahale/f9f3781f7b54985bee94 -
References () https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07 - () https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07 -
References () https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11 - () https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11 -
References () https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J - () https://groups.google.com/d/msg/rack-devel/xKrHVWeNvDM/4ZGA576CnK4J -
References () https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ - () https://groups.google.com/forum/#%21msg/rack-devel/RnQxm6i13C4/xfakH81yWvgJ -
References () https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ - () https://groups.google.com/forum/#%21msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ -
References () https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ - () https://groups.google.com/forum/#%21msg/rack-devel/hz-liLb9fKE/8jvVWU6xYiYJ -
References () https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ - () https://groups.google.com/forum/#%21msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ -
References () https://puppet.com/security/cve/cve-2013-0263 - () https://puppet.com/security/cve/cve-2013-0263 -
References () https://twitter.com/coda/statuses/299732877745197056 - () https://twitter.com/coda/statuses/299732877745197056 -

Information

Published : 2013-02-08 20:55

Updated : 2024-11-21 01:47


NVD link : CVE-2013-0263

Mitre link : CVE-2013-0263

CVE.ORG link : CVE-2013-0263


JSON object : View

Products Affected

rack_project

  • rack