Skip to content
This repository has been archived by the owner on Jul 14, 2021. It is now read-only.

[Security] Bump rack from 2.2.2 to 2.2.3 in /omnibus #2958

Merged
merged 1 commit into from
Jun 15, 2020

Conversation

dependabot-preview[bot]
Copy link
Contributor

Bumps rack from 2.2.2 to 2.2.3. This update includes a security fix.

Vulnerabilities fixed

Sourced from The Ruby Advisory Database.

Percent-encoded cookies can be used to overwrite existing prefixed cookie names It is possible to forge a secure or host-only cookie prefix in Rack using an arbitrary cookie write by using URL encoding (percent-encoding) on the name of the cookie. This could result in an application that is dependent on this prefix to determine if a cookie is safe to process being manipulated into processing an insecure or cross-origin request. This vulnerability has been assigned the CVE identifier CVE-2020-8184.

Versions Affected: rack < 2.2.3, rack < 2.1.4 Not affected: Applications which do not rely on __Host- and __Secure- prefixes to determine if a cookie is safe to process Fixed Versions: rack >= 2.2.3, rack >= 2.1.4

Impact

An attacker may be able to trick a vulnerable application into processing an insecure (non-SSL) or cross-origin request if they can gain the ability to write arbitrary cookies that are sent to the application.

Workarounds

... (truncated)

Patched versions: ~> 2.1.4; >= 2.2.3 Unaffected versions: none

Changelog

Sourced from rack's changelog.

Changelog

All notable changes to this project will be documented in this file. For info on how to format all future additions to this file please reference Keep A Changelog.

[3.0.0] - Unreleased

Changed

  • BREAKING CHANGE: Require status to be an Integer. (#1662, @olleolleolle)
  • Relax validations around Rack::Request#host and Rack::Request#hostname. (#1606, @pvande)
  • Removed antiquated handlers: FCGI, LSWS, SCGI, Thin. (#1658, @ioquatix)
  • Removed options from Rack::Builder.parse_file and Rack::Builder.load_file. (#1663, @ioquatix)

Fixed

  • Fix using Rack::Session::Cookie with coder: Rack::Session::Cookie::Base64::{JSON,Zip}. (#1666, @jeremyevans)
  • Avoid NoMethodError when accessing Rack::Session::Cookie without requiring delegate first. (#1610, @onigra)
  • Handle cookies with values that end in '=' (#1645, @lukaso)
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in the .dependabot/config.yml file in this repo:

  • Update frequency
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

Bumps [rack](https://github.com/rack/rack) from 2.2.2 to 2.2.3. **This update includes a security fix.**
- [Release notes](https://github.com/rack/rack/releases)
- [Changelog](https://github.com/rack/rack/blob/master/CHANGELOG.md)
- [Commits](rack/rack@v2.2.2...2.2.3)

Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
@dependabot-preview dependabot-preview bot requested review from a team as code owners June 15, 2020 23:13
@dependabot-preview dependabot-preview bot added Aspect: Security Can an unwanted third party affect the stability or look at privileged information? Type: Chore non-critical maintenance of a project. labels Jun 15, 2020
@tas50 tas50 merged commit bf32d2f into master Jun 15, 2020
@chef-expeditor chef-expeditor bot deleted the dependabot/bundler/omnibus/rack-2.2.3 branch June 15, 2020 23:18
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Aspect: Security Can an unwanted third party affect the stability or look at privileged information? Type: Chore non-critical maintenance of a project.
Development

Successfully merging this pull request may close these issues.

1 participant