CVE-2021-28680

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-28680
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-28680.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-28680
Aliases
Published
2021-12-07T21:15:08Z
Modified
2024-05-14T08:32:39.309013Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The devisemasquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secretkeybase value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devisemasquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.

References

Affected packages

Git / github.com/oivoodoo/devise_masquerade

Affected ranges

Type
GIT
Repo
https://github.com/oivoodoo/devise_masquerade
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.1.7
v0.1.8
v0.2.0
v0.3.0
v0.3.1
v0.4.0
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.6.0
v0.6.1
v0.6.2
v0.6.3
v0.6.4
v0.6.5

v1.*

v1.0.0
v1.1.0
v1.2.0