Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-26144
Summary
Rails is a web-application framework. There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a 'Set-Cookie' header along with the user's session cookie when serving blobs. It also sets 'Cache-Control' to public. Certain proxies may cache the 'Set-Cookie', leading to an information leak. This issue affects the package activestorage and @rails/activestorage versions 5.2.0.beta1 through 6.1.7.6, and 7.0.0.alpha1 through 7.0.8.
- LOW
- NETWORK
- NONE
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-200 - Information Exposure
An information exposure vulnerability is categorized as an information flow (IF) weakness, which can potentially allow unauthorized access to otherwise classified information in the application, such as confidential personal information (demographics, financials, health records, etc.), business secrets, and the application's internal environment.
References
Advisory Timeline
- Published