Description
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Remediation
References
Related Vulnerabilities
WordPress Plugin Backup Migration Cross-Site Request Forgery (1.2.9)
WordPress Plugin Caldera Forms-More Than Contact Forms Information Disclosure (1.3.5.2)
Jenkins Incorrect Authorization Vulnerability (CVE-2018-1999047)
e107 Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2008-1989)