Description
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Remediation
References
Related Vulnerabilities
WordPress Plugin MyBookTable Bookstore by Author Media Cross-Site Scripting (3.2.1)
ASP.NET MVC Improper Input Validation Vulnerability (CVE-2017-0256)
MySQL CVE-2018-3278 Vulnerability (CVE-2018-3278)
Joomla! Core 3.x.x Remote File Inclusion (3.0.0 - 3.2.5)
WordPress Plugin Stripe Payment for WooCommerce Security Bypass (3.7.7)