CVE-2019-16779

medium

Description

In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.

References

https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html

https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9

https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29

http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html

http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html

Details

Source: Mitre, NVD

Published: 2019-12-16

Updated: 2021-10-28

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: Medium