REST client for Ruby (aka rest-client) versions 1.6.1.a until 1.8.0 allow remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
References
- https://nvd.nist.gov/vuln/detail/CVE-2015-1820
- https://github.com/rest-client/rest-client/issues/369
- https://bugzilla.redhat.com/show_bug.cgi?id=1205291
- https://github.com/advisories/GHSA-3fhf-6939-qg8p
- http://www.openwall.com/lists/oss-security/2015/03/24/3
- http://www.securityfocus.com/bid/73295
- https://rubygems.org/gems/rest-client/versions/1.6.1.a