Skip to main content

Exposure of Sensitive Information to an Unauthorized Actor

CVE-2024-26144

Severity Medium
Score 5.3/10

Summary

Rails is a web-application framework. There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a 'Set-Cookie' header along with the user's session cookie when serving blobs. It also sets 'Cache-Control' to public. Certain proxies may cache the 'Set-Cookie', leading to an information leak. This issue affects the package activestorage and @rails/activestorage versions 5.2.0.beta1 through 6.1.7.6, and 7.0.0.alpha1 through 7.0.8.

  • LOW
  • NETWORK
  • NONE
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-200 - Information Exposure

An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.

Advisory Timeline

  • Published