Source: ruby-rack-session
Version: 2.1.1-0.1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for ruby-rack-session.

CVE-2026-39324[0]:
| Rack::Session is a session management implementation for Rack. From
| 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles
| decryption failures when configured with secrets:. If cookie
| decryption fails, the implementation falls back to a default decoder
| instead of rejecting the cookie. This allows an unauthenticated
| attacker to supply a crafted session cookie that is accepted as
| valid session data without knowledge of any configured secret.
| Because this mechanism is used to load session state, an attacker
| can manipulate session contents and potentially gain unauthorized
| access. This vulnerability is fixed in 2.1.2.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-39324
    https://www.cve.org/CVERecord?id=CVE-2026-39324
[1] https://github.com/rack/rack-session/security/advisories/GHSA-33qg-7wpp-89cq
[2] 
https://github.com/rack/rack-session/commit/f43638cb3a4d15c3ecaf59e67a04b47fda08eeac

Regards,
Salvatore

Reply via email to