CVE-2021-41263

rails_multisite provides multi-db support for Rails applications. In affected versions this vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
Configurations

Configuration 1 (hide)

cpe:2.3:a:discourse:rails_multisite:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
CVSS v2 : 6.0
v3 : 8.8
v2 : 6.0
v3 : 8.3
References () https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0 - Patch, Third Party Advisory () https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0 - Patch, Third Party Advisory
References () https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh - Third Party Advisory () https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh - Third Party Advisory

Information

Published : 2021-11-15 20:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41263

Mitre link : CVE-2021-41263

CVE.ORG link : CVE-2021-41263


JSON object : View

Products Affected

discourse

  • rails_multisite
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-565

Reliance on Cookies without Validation and Integrity Checking

CWE-327

Use of a Broken or Risky Cryptographic Algorithm