Bug 926396 (CVE-2015-1820) - VUL-1: CVE-2015-1820: rubygem-rest-client: ruby rest-client session fixation vulnerability
Summary: VUL-1: CVE-2015-1820: rubygem-rest-client: ruby rest-client session fixation...
Status: RESOLVED FIXED
Alias: CVE-2015-1820
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Bernhard Wiedemann
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/115614/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-04-08 12:21 UTC by Marcus Meissner
Modified: 2020-03-20 16:20 UTC (History)
6 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2015-04-08 12:21:20 UTC
via oss-sec

From: Andy Brody <andy@abrody.com>
Date: Mon, 23 Mar 2015 21:33:04 -0700
Subject: [oss-security] CVE-2015-1820: ruby rest-client session fixation vulnerability

Following the very similar vulnerability in python-requests
(CVE-2015-2296), the rest-client team discovered a vulnerability which
has now been fixed in rest-client 1.8.0.
https://rubygems.org/gems/rest-client/versions/1.8.0
https://github.com/rest-client/rest-client/issues/369

The problematic behavior was introduced in rest-client 1.6.1: any
Set-Cookie headers present in an HTTP 30x redirection response are
blindly sent to the redirection target, regardless of domain, path,
expiration, or secure cookie settings. All subsequent 1.6.x and 1.7.x
releases are affected.

Similarly to the issue with python-requests, the issue could be
exploited in the following ways:

- If you are the redirection source (i.e. you can make rest-client hit
your URL), you can make rest-client perform a request to any
third-party domain with cookies of your choosing. This may be useful
in performing a session fixation attack.
- If you are the redirection target (i.e. you can make a third-party
site redirect to your URL), you can steal any cookies set by the
third-party redirection.

This issue has been assigned CVE-2015-1820.

Cheers,
Andy
Comment 1 Swamp Workflow Management 2015-04-08 22:00:27 UTC
bugbot adjusting priority
Comment 4 Vincent Untz 2015-05-12 11:36:55 UTC
Bernhard: would you have time for these security updates? Or would you like someone else to help?
Comment 7 Bernhard Wiedemann 2016-01-14 13:24:25 UTC
The fix seems to be
https://github.com/rest-client/rest-client/pull/365
but it did not apply cleanly to our 1.6.7 version
so I used git to cherry-pick the 3 commits onto it
https://build.suse.de/request/show/88896

needs careful testing if nothing broke
Comment 10 Marcus Meissner 2016-03-21 15:56:12 UTC
well, +  s.add_dependency('http-cookie', '>= 1.0.2', '< 2.0')

we do not ship the http-cookie rubygem.
Comment 12 Alexandros Toptsoglou 2020-03-20 16:20:47 UTC
done