6.8

CVE-2007-6077

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks.  NOTE: this is due to an incomplete fix for CVE-2007-5380.

Data is provided by the National Vulnerability Database (NVD)
RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
   RubyonrailsRails Version1.2.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 4.15% 0.875
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.