From the Debian DSA Andres Salomon no ticed a problem in the CGI session management of Ruby, an object-oriented scripting language. CGI::Session's FileStore (and presumably PStore, but not in Debian woody) implementations store session information insecurely. They simply create files, ignoring permission issues. This can lead an attacker who has also shell access to the webserver to take over a session. This issue was reported to the Debian bug system http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=260779 This issue should also affect RHEL2.1 Fedora Core is being handled by bug 130063
this problem should be fixed in 1.6.8-9.EL3.1 and 1.6.4-2.AS21.0. please confirm it.
This issue is CAN-2004-0755
I can verify your new rpms fix the problem. I'll attach my little test cgi script.
Created attachment 102862 [details] Test script If this bug is fixed, the permissions of the ls the script outputs should be -rw-------
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-441.html