Timing Attack

Affecting rack-protection gem, versions <1.5.5 || >=2.0.0.beta1, <2.0.0

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

rack-protection helps protect against typical web attacks.

Affected versions of the package are vulnerable to Timing Attack due to time-variable comparison of signatures. A malicious user can guess a valid signature one char at a time by considering the time it takes a signature validation to fail.

You can read more about timing attacks on our blog

Remediation

Upgrade rack-protection to versions 1.5.5, 2.0.0 or higher.

References

CVSS Score

5.9
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit
Unknown
CVE
CVE-2018-1000119
CWE
CWE-208
Snyk ID
SNYK-RUBY-RACKPROTECTION-20395
Disclosed
24 May, 2015
Published
02 Aug, 2017