CVE-2024-26144
27.02.2024, 16:15
Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.Enginsight
Vendor | Product | Version |
---|---|---|
rubyonrails | rails | 5.2.0 ≤ 𝑥 < 6.1.7.7 |
rubyonrails | rails | 7.0.0 ≤ 𝑥 < 7.1.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rails |
| ||||||||||||||||||
rails-4.0 |
| ||||||||||||||||||
ruby-actionpack-3.2 |
| ||||||||||||||||||
ruby-activemodel-3.2 |
| ||||||||||||||||||
ruby-activerecord-3.2 |
| ||||||||||||||||||
ruby-activesupport-3.2 |
| ||||||||||||||||||
ruby-rails-3.2 |
|
Common Weakness Enumeration
References