REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Link | Tags |
---|---|
https://github.com/rest-client/rest-client/issues/369 | third party advisory |
http://www.securityfocus.com/bid/73295 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1205291 | patch vdb entry third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2015/03/24/3 | vdb entry mailing list |