| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-33qg-7wpp-89cq | Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rack
Rack rack-session |
|
| Vendors & Products |
Rack
Rack rack-session |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rack::Session is a session management implementation for Rack. From 2.0.0 to before 2.1.2, Rack::Session::Cookie incorrectly handles decryption failures when configured with secrets:. If cookie decryption fails, the implementation falls back to a default decoder instead of rejecting the cookie. This allows an unauthenticated attacker to supply a crafted session cookie that is accepted as valid session data without knowledge of any configured secret. Because this mechanism is used to load session state, an attacker can manipulate session contents and potentially gain unauthorized access. This vulnerability is fixed in 2.1.2. | |
| Title | Rack::Session::Cookie secrets: decrypt failure fallback enables secretless session forgery and Marshal deserialization | |
| Weaknesses | CWE-287 CWE-345 CWE-502 CWE-565 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T18:44:07.145Z
Reserved: 2026-04-06T19:31:07.266Z
Link: CVE-2026-39324
Updated: 2026-04-08T18:44:00.411Z
Status : Received
Published: 2026-04-07T18:16:43.387
Modified: 2026-04-07T18:16:43.387
Link: CVE-2026-39324
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:46:43Z
Github GHSA