CVE-2009-3086: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
References
- lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
- secunia.com/advisories/36600
- weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails
- www.debian.org/security/2011/dsa-2260
- www.securityfocus.com/bid/37427
- www.vupen.com/english/advisories/2009/2544
- github.com/advisories/GHSA-fg9w-g6m4-557j
- nvd.nist.gov/vuln/detail/CVE-2009-3086
Detect and mitigate CVE-2009-3086 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →