Timing attack in Ruby on Rails - CVE-2015-7576

 

Timing attack in Ruby on Rails - CVE-2015-7576

Published: January 26, 2016 / Updated: September 22, 2017


Vulnerability identifier: #VU8579
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-7576
CWE-ID: CWE-385
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Rails
Affected software:
Ruby on Rails

Detailed vulnerability description

The vulnerability allows a remote attacker to bypass authentication.

The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.

How to mitigate CVE-2015-7576

Update to version 3.2.22.1, 4.1.14.1, 4.2.5.1.

Sources