Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 544326 (CVE-2015-1820) - dev-ruby/rest-client-1.8.0: session fixation vulnerability (CVE-2015-1820)
Summary: dev-ruby/rest-client-1.8.0: session fixation vulnerability (CVE-2015-1820)
Status: RESOLVED FIXED
Alias: CVE-2015-1820
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-03-24 13:16 UTC by Agostino Sarubbo
Modified: 2015-07-05 21:27 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-03-24 13:16:45 UTC
From ${URL} :

Following the very similar vulnerability in python-requests
(CVE-2015-2296), the rest-client team discovered a vulnerability which
has now been fixed in rest-client 1.8.0.
https://rubygems.org/gems/rest-client/versions/1.8.0
https://github.com/rest-client/rest-client/issues/369

The problematic behavior was introduced in rest-client 1.6.1: any
Set-Cookie headers present in an HTTP 30x redirection response are
blindly sent to the redirection target, regardless of domain, path,
expiration, or secure cookie settings. All subsequent 1.6.x and 1.7.x
releases are affected.

Similarly to the issue with python-requests, the issue could be
exploited in the following ways:

- If you are the redirection source (i.e. you can make rest-client hit
your URL), you can make rest-client perform a request to any
third-party domain with cookies of your choosing. This may be useful
in performing a session fixation attack.
- If you are the redirection target (i.e. you can make a third-party
site redirect to your URL), you can steal any cookies set by the
third-party redirection.

This issue has been assigned CVE-2015-1820.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Hans de Graaff gentoo-dev Security 2015-03-29 07:08:06 UTC
rest-client 1.8.0 is now in the tree.

The following packages should be marked stable:


=dev-ruby/http-cookie-1.0.2
=dev-ruby/rest-client-1.8.0
Comment 2 Agostino Sarubbo gentoo-dev 2015-03-29 12:04:49 UTC
amd64 stable
Comment 3 Agostino Sarubbo gentoo-dev 2015-03-29 12:05:07 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 4 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2015-03-29 12:05:50 UTC
GLSA vote: no.
Comment 5 Hans de Graaff gentoo-dev Security 2015-03-31 06:16:01 UTC
All vulnerable versions are now removed or masked.
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2015-04-22 18:46:08 UTC
Maintainer(s), Thank you for you for cleanup.

GLSA Vote: No