Critical severity9.8NVD Advisory· Published Aug 9, 2017· Updated May 13, 2026
CVE-2015-1820
CVE-2015-1820
Description
REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rest-clientRubyGems | >= 1.6.1.a, < 1.8.0 | 1.8.0 |
Affected products
1- cpe:2.3:a:rest-client_project:rest-client:*:*:*:*:*:ruby:*:*Range: <=1.7.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party AdvisoryVDB EntryWEB
- www.securityfocus.com/bid/73295nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-3fhf-6939-qg8pghsaADVISORY
- github.com/rest-client/rest-client/issues/369nvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2015-1820ghsaADVISORY
- www.openwall.com/lists/oss-security/2015/03/24/3nvdMailing ListVDB EntryWEB
- rubygems.org/gems/rest-client/versions/1.6.1.aghsaWEB
- web.archive.org/web/20200228080106/http://www.securityfocus.com/bid/73295ghsaWEB
News mentions
0No linked articles in our index yet.