Description
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
Remediation
References
Related Vulnerabilities
WordPress Plugin Cimy User Extra Fields Denial of Service (2.6.3)
WordPress Plugin Stars Menu Cross-Site Scripting (1.0.1)
TYPO3 Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-0815)
MySQL CVE-2013-1552 Vulnerability (CVE-2013-1552)
WordPress Plugin VDZ VERIFICATION (Custom Meta Tags) Cross-Site Scripting (1.3.12)