Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200409-08] Ruby: CGI::Session creates files insecurely Vulnerability Scan

Vulnerability Scan Summary
Ruby: CGI::Session creates files insecurely

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200409-08
(Ruby: CGI::Session creates files insecurely)

The CGI::Session::FileStore implementation (and presumably
CGI::Session::PStore), which allow data associated with a particular
Session instance to be written to a file, writes to a file in /tmp with no
regard for secure permissions. As a result, the file is left with whatever
the default umask permissions are, which commonly would allow other local
users to read the data from that session file.


Depending on the default umask, any data stored using these methods could
be read by other users on the system.


By changing the default umask on the system to not permit read access to
other users (e.g. 0700), one can prevent these files from being readable by
other users.


All Ruby users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=dev-lang/ruby-your_version"
# emerge ">=dev-lang/ruby-your_version"

Threat Level: Medium

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.