{"id":"CVE-2015-1820","details":"REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.","aliases":["GHSA-3fhf-6939-qg8p"],"modified":"2026-04-16T06:23:53.255980266Z","published":"2017-08-09T18:29:00Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2015/03/24/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/73295"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1205291"},{"type":"ADVISORY","url":"https://github.com/rest-client/rest-client/issues/369"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/03/24/3"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1205291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1205291"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}