Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rails
  4. ›
  5. CVE-2007-6077

CVE-2007-6077: session fixation protection mechanism in cgi_process.rb in Rails

October 24, 2017 (updated April 9, 2025)

The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.

References

  • github.com/advisories/GHSA-p4c6-77gc-694x
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-6077.yml
  • nvd.nist.gov/vuln/detail/CVE-2007-6077
  • rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release

Code Behaviors & Features

Detect and mitigate CVE-2007-6077 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.2.6

Fixed versions

  • 1.2.6

Solution

Upgrade to version 1.2.6 or above.

Impact 6.8 MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P

Learn more about CVSS

Weakness

  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Source file

gem/rails/CVE-2007-6077.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:59 +0000.