Non Unique Authentication Cookie Values Affecting devise package, versions <3.5.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Non Unique Authentication Cookie Values vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-DEVISE-20252
  • published17 Jan 2016
  • disclosed17 Jan 2016
  • creditAlfredo Ramirez

Introduced: 17 Jan 2016

CVE-2015-8314  (opens in a new tab)
CWE-330  (opens in a new tab)

How to fix?

Upgrade devise to version 3.5.4 or higher.

Overview

devise is an authentication framework for Rails with Warden.

Affected versions implement the 'remember me' functionality by using the same cookie for the user across all their devices. This increases the chance of the user identity being stolen. Furthermore, it does not allow to selectively revoke a specific cookie value, forcing 'all or none' if the user wishes to sign out. The fix introduces a timestamp to the cookie value, making it unique per device.

CVSS Scores

version 3.1