CVE-2020-15237

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15237
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15237.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-15237
Aliases
Published
2020-10-05T19:15:15Z
Modified
2024-05-14T07:55:26.403553Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In Shrine before version 3.3.0, when using the derivation_endpoint plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using Rack::Utils.secure_compare. Users using the derivation_endpoint plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.

References

Affected packages

Git / github.com/shrinerb/shrine

Affected ranges

Type
GIT
Repo
https://github.com/shrinerb/shrine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.9.0

v1.*

v1.0.0
v1.1.0
v1.2.0
v1.3.0
v1.4.0
v1.4.1
v1.4.2

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.1
v2.10.0
v2.11.0
v2.12.0
v2.13.0
v2.14.0
v2.15.0
v2.16.0
v2.17.0
v2.17.1
v2.18.0
v2.19.0
v2.2.0
v2.3.0
v2.3.1
v2.4.0
v2.4.1
v2.5.0
v2.6.0
v2.6.1
v2.7.0
v2.8.0
v2.9.0

v3.*

v3.0.0
v3.0.0.alpha
v3.0.0.beta
v3.0.0.beta2
v3.0.0.beta3
v3.0.0.rc
v3.0.1
v3.1.0
v3.2.0
v3.2.1