Timing Attack

Affecting sinatra gem, versions <0.0.0

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Amendment

This is a duplicate of SNYK-RUBY-SINATRA-20488

Overview

sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.

Affected versions of the package are vulnerable to Timing Attack. It did not use a constant time comparison for the CSRF tokens. As a result, the comparison will fail faster when the first characters in the token are incorrect. An attacker can use this difference to perform a timing attack.

Remediation

Upgrade sinatra to version 2.0.0.beta2 or higher.

References

CVSS Score

4.3
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    Low
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Credit
Unknown
CWE
CWE-208
Snyk ID
SNYK-RUBY-SINATRA-20470
Disclosed
24 May, 2015
Published
10 Jan, 2018