cve/2024/CVE-2024-26144.md
2024-07-25 21:25:12 +00:00

19 lines
1.0 KiB
Markdown

### [CVE-2024-26144](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26144)
![](https://img.shields.io/static/v1?label=Product&message=rails&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3E%3D%205.2.0%2C%20%3C%206.1.7.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
Rails is a web-application framework. Starting with version 5.2.0, there is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a Set-Cookie header along with the user's session cookie when serving blobs. It also sets Cache-Control to public. Certain proxies may cache the Set-Cookie, leading to an information leak. The vulnerability is fixed in 7.0.8.1 and 6.1.7.7.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub