Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secret_key_base value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devise_masquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Devise Masquerade安全漏洞
Vulnerability Description
Alexandr Korsak Devise Masquerade是西班牙Alexandr Korsak公司的一个实用程序库。用于启用诸如作为管理员登录按钮之类的功能。 Devise Masquerade存在安全漏洞,该漏洞源于1.3之前的设计伪装宝石允许某些攻击时,密码的盐是未知的。一个应用程序,使用这个宝石,让管理员伪装模拟用户失去了一层安全保护的情况下,设计(没有这个扩展)是使用。如果服务器端密钥基值是公开的(例如,如果它被错误地提交给公共存储库),仍然有其他保护措施可以防止攻击者可利用该漏洞模拟站
CVSS Information
N/A
Vulnerability Type
N/A