#VU8579 Timing attack in Ruby on Rails - CVE-2015-7576

 

#VU8579 Timing attack in Ruby on Rails - CVE-2015-7576

Published: January 26, 2016 / Updated: September 22, 2017


Vulnerability identifier: #VU8579
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2015-7576
CWE-ID: CWE-385
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Ruby on Rails
Software vendor:
Rails

Description

The vulnerability allows a remote attacker to bypass authentication.

The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.

Remediation

Update to version 3.2.22.1, 4.1.14.1, 4.2.5.1.

External links