Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-65tq-e5eb-eucj
Vulnerability ID VCID-65tq-e5eb-eucj
Aliases CVE-2024-26144
GHSA-8h22-8cf7-hq6g
Summary Rails has possible Sensitive Session Information Leak in Active Storage # Possible Sensitive Session Information Leak in Active Storage There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a `Set-Cookie` header along with the user's session cookie when serving blobs. It also sets `Cache-Control` to public. Certain proxies may cache the Set-Cookie, leading to an information leak. This vulnerability has been assigned the CVE identifier CVE-2024-26144. Versions Affected: >= 5.2.0, < 7.1.0 Not affected: < 5.2.0, > 7.1.0 Fixed Versions: 7.0.8.1, 6.1.7.7 Impact ------ A proxy which chooses to caches this request can cause users to share sessions. This may include a user receiving an attacker's session or vice versa. This was patched in 7.1.0 but not previously identified as a security vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Upgrade to Rails 7.1.X, or configure caching proxies not to cache the Set-Cookie headers. Credits ------- Thanks to [tyage](https://hackerone.com/tyage) for reporting this!
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26144.json
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
epss 0.03103 https://api.first.org/data/v1/epss?cve=CVE-2024-26144
cvssv3 5.3 https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
cvssv3.1 5.3 https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
generic_textual MODERATE https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
ssvc Track https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-8h22-8cf7-hq6g
cvssv3.1 5.3 https://github.com/rails/rails
generic_textual MODERATE https://github.com/rails/rails
cvssv3.1 5.3 https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433
generic_textual MODERATE https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433
ssvc Track https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433
cvssv3.1 5.3 https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3
generic_textual MODERATE https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3
ssvc Track https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3
cvssv3.1 5.3 https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
cvssv3.1_qr MODERATE https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
generic_textual MODERATE https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
ssvc Track https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
cvssv3.1 5.3 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26144.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26144.yml
cvssv3.1 5.3 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml
generic_textual MODERATE https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml
ssvc Track https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2024-26144
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-26144
cvssv3.1 5.3 https://security.netapp.com/advisory/ntap-20240510-0013
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20240510-0013
cvssv3.1 5.3 https://security.netapp.com/advisory/ntap-20240510-0013/
ssvc Track https://security.netapp.com/advisory/ntap-20240510-0013/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-26144.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rails/rails
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26144.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2024-26144
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20240510-0013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20240510-0013/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-09T14:01:13Z/ Found at https://security.netapp.com/advisory/ntap-20240510-0013/
Exploit Prediction Scoring System (EPSS)
Percentile 0.86759
EPSS Score 0.03103
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:34.899349+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-8h22-8cf7-hq6g/GHSA-8h22-8cf7-hq6g.json 38.0.0