Description
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Remediation
References
Related Vulnerabilities
WordPress Plugin CAPTCHA in Thai Multiple Cross-Site Scripting Vulnerabilities (1.1)
Jenkins Improper Input Validation Vulnerability (CVE-2016-0792)
WebLogic CVE-2018-11039 Vulnerability (CVE-2018-11039)
Python Other Vulnerability (CVE-2006-4980)
WordPress Plugin WP Super Cache Cross-Site Scripting (1.4.2)