Description
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Remediation
References
Related Vulnerabilities
WordPress Plugin All-in-One Event Calendar Multiple Cross-Site Scripting Vulnerabilities (1.5)
WordPress Plugin Premmerce Variation Swatches for WooCommerce Security Bypass (1.0)
Drupal Core 7.x Multiple Vulnerabilities (7.0 - 7.38)
WordPress Plugin WPML (WordPress Multilingual) Cross-Site Request Forgery (4.3.6)
Python Uncontrolled Resource Consumption Vulnerability (CVE-2020-8492)