{"id":"CVE-2015-1820","details":"REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.","aliases":["GHSA-3fhf-6939-qg8p"],"modified":"2026-01-27T04:13:50.217700Z","published":"2017-08-09T18:29:00Z","withdrawn":"2026-01-27T04:13:50.217700Z","related":["MGASA-2015-0227"],"references":[{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2015/03/24/3"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/73295"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1205291"},{"type":"ADVISORY","url":"https://github.com/rest-client/rest-client/issues/369"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}