Skip to content

Commit 5bb446b

Browse files
committed
chore: adjust dependencies
fix: Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. This vulnerability affects Addressable >= 2.3.0 (note: 2.3.0 and 2.3.1 were yanked; the earliest installable release is 2.3.2). It was partially fixed in version 2.8.10 and fully remediated in 2.9.0. The vulnerability is more exploitable on MRI Ruby < 3.2 and on all versions of JRuby and TruffleRuby. MRI Ruby 3.2 and later ship with Onigmo 6.9, which introduces memoization that prevents catastrophic backtracking for the first class of template. JRuby and TruffleRuby do not implement equivalent memoization and remain vulnerable to all patterns
1 parent 91b7a62 commit 5bb446b

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

Gemfile.lock

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,8 +74,8 @@ GEM
7474
minitest (>= 5.1, < 6)
7575
securerandom (>= 0.3)
7676
tzinfo (~> 2.0, >= 2.0.5)
77-
addressable (2.8.7)
78-
public_suffix (>= 2.0.2, < 7.0)
77+
addressable (2.9.0)
78+
public_suffix (>= 2.0.2, < 8.0)
7979
annotate (3.2.0)
8080
activerecord (>= 3.2, < 8.0)
8181
rake (>= 10.4, < 14.0)
@@ -295,7 +295,7 @@ GEM
295295
rack-cors (3.0.0)
296296
logger
297297
rack (>= 3.0.14)
298-
rack-session (2.1.1)
298+
rack-session (2.1.2)
299299
base64 (>= 0.1.0)
300300
rack (>= 3.0.0)
301301
rack-test (2.2.0)

0 commit comments

Comments
 (0)