CVE-2013-0263
Summary
| CVE | CVE-2013-0263 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-02-08 20:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time. |
Risk And Classification
Primary CVSS: v2.0 5.1 from [email protected]
AV:N/AC:H/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-noinfo | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
HighAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:H/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rack Project | Rack | 1.1.0 | All | All | All |
| Application | Rack Project | Rack | 1.1.4 | All | All | All |
| Application | Rack Project | Rack | 1.1.5 | All | All | All |
| Application | Rack Project | Rack | 1.1.6 | All | All | All |
| Application | Rack Project | Rack | 1.2.0 | All | All | All |
| Application | Rack Project | Rack | 1.2.1 | All | All | All |
| Application | Rack Project | Rack | 1.2.2 | All | All | All |
| Application | Rack Project | Rack | 1.2.3 | All | All | All |
| Application | Rack Project | Rack | 1.2.4 | All | All | All |
| Application | Rack Project | Rack | 1.2.6 | All | All | All |
| Application | Rack Project | Rack | 1.2.7 | All | All | All |
| Application | Rack Project | Rack | 1.3.0 | All | All | All |
| Application | Rack Project | Rack | 1.3.1 | All | All | All |
| Application | Rack Project | Rack | 1.3.2 | All | All | All |
| Application | Rack Project | Rack | 1.3.3 | All | All | All |
| Application | Rack Project | Rack | 1.3.4 | All | All | All |
| Application | Rack Project | Rack | 1.3.5 | All | All | All |
| Application | Rack Project | Rack | 1.3.6 | All | All | All |
| Application | Rack Project | Rack | 1.3.7 | All | All | All |
| Application | Rack Project | Rack | 1.3.8 | All | All | All |
| Application | Rack Project | Rack | 1.3.9 | All | All | All |
| Application | Rack Project | Rack | 1.4.0 | All | All | All |
| Application | Rack Project | Rack | 1.4.1 | All | All | All |
| Application | Rack Project | Rack | 1.4.2 | All | All | All |
| Application | Rack Project | Rack | 1.4.3 | All | All | All |
| Application | Rack Project | Rack | 1.4.4 | All | All | All |
| Application | Rack Project | Rack | 1.5.0 | All | All | All |
| Application | Rack Project | Rack | 1.5.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Omelas County Chamber of Commerce na Twitterze: "Rack just released a fix for CVE-2013-0263, a timing attack vulnerability I reported to them TWO AND A HALF YEARS AGO BACK WHEN IT WAS COOL." | af854a3a-2127-422b-91ae-364da2661108 | twitter.com | |
| Redirecting to Google Groups | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| Redirecting to Google Groups | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| Security Advisory SA52774 - Red Hat update for Red Hat Subscription Asset Manager - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| openSUSE-SU-2013:0462-1: moderate: RubyOnRails: security version update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Security Advisory SA52033 - Rack Insecure File Access Security Issue - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Use secure_compare for hmac comparison · rack/rack@0cd7e9a · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| gist:f9f3781f7b54985bee94 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | gist.github.com | |
| Redirecting to Google Groups | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| Debian -- Security Information -- DSA-2783-1 librack-ruby | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Redirecting to Google Groups | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| Add secure_compare to Rack::Utils · rack/rack@9a81b96 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | |
| Security Advisory SA52134 - Rack "Rack::Session::Cookie" Information Disclosure Security Issue - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| www.osvdb.org/89939 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| Google Groups | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| Rack: a Ruby Webserver Interface | af854a3a-2127-422b-91ae-364da2661108 | rack.github.com | Vendor Advisory |
| 909071 – (CVE-2013-0263) CVE-2013-0263 rubygem-rack: Timing attack in cookie sessions | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.redhat.com | |
| CVE-2013-0263 | Puppet | af854a3a-2127-422b-91ae-364da2661108 | puppet.com | |
| Google Groups | MITRE | groups.google.com | |
| Google Groups | MITRE | groups.google.com | |
| Google Groups | MITRE | groups.google.com | |
| Google Groups | MITRE | groups.google.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.