ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
RubyGems
GHSA-fmx4-26r3-wxpf
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
### Impact CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution. If affected versions of CommonMarker are used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE). ### Patches This vulnerability has been patched in the following CommonMarker release: - v0.23.4 ### Workarounds The vulnerability exists in the table markdown extensions of `cmark-gfm`. Disabling any use of the table extension will prevent this vulnerability from being triggered. ### References - https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x ### Acknowledgements We would like to thank Felix Wilhelm of Google's Project Zero for reporting this vulnerability ### For more information If you have any questions or comments about this advisory: * Open an issue in [CommonMarker](http://github.com/gjtorikian/commonmarker)
null
2022-03-07T20:47:53.775868Z
2022-03-03T20:28:47Z
HIGH
null
{'CWE-190'}
{'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3', 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x', 'https://github.com/gjtorikian/commonmarker', 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'}
null
RubyGems
GHSA-75w6-p6mg-vh8j
Moderate severity vulnerability that affects rails
Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.
{'CVE-2011-0446'}
2022-03-03T05:14:10.012590Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-75w6-p6mg-vh8j', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://www.vupen.com/english/advisories/2011/0877', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446', 'http://www.debian.org/security/2011/dsa-2247', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://secunia.com/advisories/43666', 'http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&output=gplain', 'http://www.securityfocus.com/bid/46291', 'http://www.vupen.com/english/advisories/2011/0587', 'http://www.securitytracker.com/id?1025064', 'http://secunia.com/advisories/43274'}
null
RubyGems
GHSA-mhwp-qhpc-h3jm
High severity vulnerability that affects activerecord
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.
{'CVE-2014-3482'}
2022-03-03T05:14:07.238128Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-89'}
{'http://www.debian.org/security/2014/dsa-2982', 'https://github.com/advisories/GHSA-mhwp-qhpc-h3jm', 'http://openwall.com/lists/oss-security/2014/07/02/5', 'http://secunia.com/advisories/59973', 'http://www.securityfocus.com/bid/68343', 'http://rhn.redhat.com/errata/RHSA-2014-0876.html', 'http://secunia.com/advisories/60214', 'http://secunia.com/advisories/60763', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'}
null
RubyGems
GHSA-fjfg-q662-gm6j
Moderate severity vulnerability that affects rails
Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
{'CVE-2007-5379'}
2022-03-03T05:14:16.166604Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-200'}
{'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'https://github.com/advisories/GHSA-fjfg-q662-gm6j', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'http://www.vupen.com/english/advisories/2007/3508', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://secunia.com/advisories/27657', 'http://www.securityfocus.com/bid/26096', 'http://docs.info.apple.com/article.html?artnum=307179', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379', 'http://dev.rubyonrails.org/ticket/8453', 'http://osvdb.org/40717', 'http://secunia.com/advisories/28136', 'http://www.vupen.com/english/advisories/2007/4238'}
null
RubyGems
GHSA-rhgq-vv9x-j4p5
lawn-login exposes database password to unauthorized users
The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.
{'CVE-2014-5000'}
2022-04-25T22:13:42Z
2018-01-22T23:45:33Z
HIGH
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-rhgq-vv9x-j4p5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5000', 'http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html'}
null
RubyGems
GHSA-g266-3crh-h7gj
Moderate severity vulnerability that affects ldoce
lib/ldoce/word.rb in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
{'CVE-2013-1911'}
2022-03-03T05:13:31.251909Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-20'}
{'http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html', 'http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.html', 'http://osvdb.org/91870', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163', 'http://www.openwall.com/lists/oss-security/2013/03/31/3', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911', 'http://www.securityfocus.com/bid/58783', 'https://github.com/advisories/GHSA-g266-3crh-h7gj'}
null
RubyGems
GHSA-cj92-c4fj-w9c5
Moderate severity vulnerability that affects mail
Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter.
{'CVE-2012-2139'}
2022-03-03T05:14:05.088425Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-22'}
{'https://github.com/mikel/mail', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html', 'http://secunia.com/advisories/48970', 'https://github.com/advisories/GHSA-cj92-c4fj-w9c5', 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f', 'https://bugzilla.redhat.com/show_bug.cgi?id=816352', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'http://www.openwall.com/lists/oss-security/2012/04/26/1', 'http://www.openwall.com/lists/oss-security/2012/04/25/8', 'https://bugzilla.novell.com/show_bug.cgi?id=759092', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}
null
RubyGems
GHSA-ww79-8xwv-932x
Moderate severity vulnerability that affects rbovirt
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
{'CVE-2014-0036'}
2022-03-03T05:13:01.436612Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'http://seclists.org/oss-sec/2014/q1/509', 'https://github.com/advisories/GHSA-ww79-8xwv-932x', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html'}
null
RubyGems
GHSA-h56m-vwxc-3qpw
Moderate severity vulnerability that affects actionpack
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
{'CVE-2014-7829'}
2022-03-03T05:13:48.955186Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-h56m-vwxc-3qpw', 'http://www.securityfocus.com/bid/71183', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829', 'https://puppet.com/security/cve/cve-2014-7829', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ'}
null
RubyGems
GHSA-m2jr-hmc3-qmpr
Authorization bypass in Spree
### Impact The perpetrator could query the [API v2 Order Status](https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint with an empty string passed as an Order token ### Patches Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected. ### References Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573 ### For more information If you have any questions or comments about this advisory: * Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
{'CVE-2020-26223'}
2022-03-03T05:14:16.962010Z
2020-11-13T17:18:22Z
HIGH
null
{'CWE-863'}
{'https://rubygems.org/gems/spree_api/versions', 'https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status', 'https://github.com/spree/spree/pull/10573', 'https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26223'}
null
RubyGems
GHSA-4hpq-rjcx-7vj9
Open Redirect in clearance
This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).
{'CVE-2021-23435'}
2022-03-03T05:13:18.797869Z
2021-09-13T20:05:09Z
HIGH
null
{'CWE-601'}
{'https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284', 'https://github.com/thoughtbot/clearance', 'https://github.com/thoughtbot/clearance/pull/945', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23435'}
null
RubyGems
GHSA-hjg4-8q5f-x6fm
Information Disclosure / Unintended Method Execution in Action Pack
Impact ------ There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input. Vulnerable code will look like this. ``` redirect_to(params[:some_param]) ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The FIXED releases are available at the normal locations. Workarounds ----------- To work around this problem, it is recommended to use an allow list for valid parameters passed from the user. For example, ``` private def check(param) case param when "valid" param else "/" end end def index redirect_to(check(params[:some_param])) end ``` Or force the user input to be cast to a string like this, ``` def index redirect_to(params[:some_param].to_s) end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-information-disclosure.patch - Patch for 5.2 series * 6-0-information-disclosure.patch - Patch for 6.0 series * 6-1-information-disclosure.patch - Patch for 6.1 series Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Benoit Côté-Jodoin from Shopify for reporting this.
{'CVE-2021-22885'}
2022-04-07T15:17:01.240074Z
2021-05-05T19:49:02Z
HIGH
null
{'CWE-200', 'CWE-209'}
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22885', 'https://github.com/rails/rails/releases/tag/v5.2.4.6', 'https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://www.debian.org/security/2021/dsa-4929', 'https://hackerone.com/reports/1106652', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://github.com/rails/rails/releases/tag/v6.0.3.7'}
null
RubyGems
GHSA-rgr4-9jh5-j4j6
Moderate severity vulnerability that affects rack
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
{'CVE-2015-3225'}
2022-03-03T05:13:23.170849Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-rgr4-9jh5-j4j6', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html', 'https://github.com/rack/rack/blob/master/HISTORY.md', 'http://rhn.redhat.com/errata/RHSA-2015-2290.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html', 'http://www.debian.org/security/2015/dsa-3322', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html', 'http://www.securityfocus.com/bid/75232', 'http://openwall.com/lists/oss-security/2015/06/16/14', 'https://github.com/rack/rack', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html'}
null
RubyGems
GHSA-pr3r-4wrp-r2pv
ActiveRecord in Ruby on Rails allows database-query bypass
Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
{'CVE-2016-6317'}
2022-04-25T16:47:04.063958Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-284', 'CWE-476'}
{'http://www.securityfocus.com/bid/92434', 'http://www.openwall.com/lists/oss-security/2016/08/11/4', 'https://github.com/advisories/GHSA-pr3r-4wrp-r2pv', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'}
null
RubyGems
GHSA-px3r-jm9g-c8w8
Moderate severity vulnerability that affects rails-html-sanitizer
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
{'CVE-2018-3741'}
2022-03-03T05:14:12.117468Z
2018-04-26T15:41:10Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3741', 'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae', 'https://github.com/advisories/GHSA-px3r-jm9g-c8w8'}
null
RubyGems
GHSA-fg9w-g6m4-557j
Moderate severity vulnerability that affects rails
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
{'CVE-2009-3086'}
2022-03-03T05:12:50.229729Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-200'}
{'http://www.vupen.com/english/advisories/2009/2544', 'http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails', 'http://secunia.com/advisories/36600', 'http://www.securityfocus.com/bid/37427', 'https://github.com/advisories/GHSA-fg9w-g6m4-557j', 'http://www.debian.org/security/2011/dsa-2260', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}
null
RubyGems
GHSA-crjr-9rc5-ghw8
Inefficient Regular Expression Complexity in Nokogiri
## Summary Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). ## References [CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) Inefficient Regular Expression Complexity ## Credit This vulnerability was reported by HackerOne user ooooooo_q (ななおく).
{'CVE-2022-24836'}
2022-04-26T18:17:12.810194Z
2022-04-11T21:18:06Z
HIGH
null
{'CWE-1333', 'CWE-400'}
{'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/', 'https://github.com/sparklemotion/nokogiri'}
null
RubyGems
GHSA-4xjh-m3qx-49wc
Jekyll allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file
Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file.
{'CVE-2018-17567'}
2022-04-26T18:48:02.306289Z
2018-09-28T19:29:07Z
HIGH
null
{'CWE-59'}
{'https://github.com/jekyll/jekyll/pull/7224', 'https://github.com/jekyll/jekyll/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17567', 'https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/', 'https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984@%3Ccommits.accumulo.apache.org%3E', 'https://github.com/advisories/GHSA-4xjh-m3qx-49wc'}
null
RubyGems
GHSA-94hm-8q65-rmxm
High severity vulnerability that affects omniauth-saml
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{'CVE-2017-11430'}
2022-03-03T05:14:10.610449Z
2019-07-05T21:11:43Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-11430', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445', 'https://github.com/advisories/GHSA-94hm-8q65-rmxm'}
null
RubyGems
GHSA-w64w-qqph-5gxm
HTTP Smuggling via Transfer-Encoding Header in Puma
### Impact This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. ### Patches The problem has been fixed in Puma 3.12.6 and Puma 4.3.5. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2020-11077'}
2022-03-03T05:13:06.003444Z
2020-05-22T14:55:09Z
MODERATE
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11077', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'}
null
RubyGems
GHSA-hgpp-pp89-4fgf
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694.
{'CVE-2012-2660'}
2022-03-03T05:14:08.475578Z
2017-10-24T18:33:38Z
MODERATE
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://github.com/advisories/GHSA-hgpp-pp89-4fgf', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660', 'https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain', 'https://github.com/rails/rails'}
null
RubyGems
GHSA-5f9h-9pjv-v6j7
Directory traversal in Rack::Directory app bundled with Rack
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
{'CVE-2020-8161'}
2022-03-03T05:13:05.884012Z
2020-07-06T21:31:02Z
MODERATE
null
{'CWE-548'}
{'https://hackerone.com/reports/434404', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8161', 'https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA', 'https://usn.ubuntu.com/4561-1/', 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e', 'https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8161.yml'}
null
RubyGems
GHSA-r23g-3qw4-gfh2
Moderate severity vulnerability that affects redcloth
Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a javascript: URI.
{'CVE-2012-6684'}
2022-03-07T20:46:58.986873Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://co3k.org/blog/redcloth-unfixed-xss-en', 'http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss', 'https://gist.github.com/co3k/75b3cb416c342aa1414c', 'http://www.debian.org/security/2015/dsa-3168', 'https://github.com/advisories/GHSA-r23g-3qw4-gfh2', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684', 'http://seclists.org/fulldisclosure/2014/Dec/50'}
null
RubyGems
GHSA-92w9-2pqw-rhjj
Moderate severity vulnerability that affects actionpack
The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method.
{'CVE-2012-3424'}
2022-03-03T05:13:03.821814Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-287'}
{'http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/', 'https://github.com/advisories/GHSA-92w9-2pqw-rhjj', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'}
null
RubyGems
GHSA-pcqq-5962-hvcw
Denial of Service in uap-core when processing crafted User-Agent strings
### Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ### Patches Please update `uap-ruby` to &gt;= v2.6.0 ### For more information https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p Reported in `uap-core` by Ben Caller @bcaller
null
2022-03-03T05:14:03.085188Z
2020-03-10T18:02:49Z
HIGH
null
null
{'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw', 'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'}
null
RubyGems
GHSA-6h5q-96hp-9jgm
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
{'CVE-2013-6415'}
2022-03-03T05:13:06.913595Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'https://puppet.com/security/cve/cve-2013-6415', 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html', 'http://secunia.com/advisories/56093', 'http://www.securityfocus.com/bid/64077'}
null
RubyGems
GHSA-g98m-96g9-wfjq
Insecure path handling in Bundler
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
{'CVE-2019-3881'}
2022-03-03T05:12:42.465042Z
2021-05-10T14:53:59Z
HIGH
null
{'CWE-427', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3881', 'https://github.com/rubygems/bundler/issues/6501', 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998', 'https://github.com/rubygems/bundler', 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826'}
null
RubyGems
GHSA-hqf9-rc9j-5fmj
Moderate severity vulnerability that affects activerecord
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving \ (backslash) characters that are not properly handled in operations on array columns.
{'CVE-2014-0080'}
2022-03-03T05:13:22.115718Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-89'}
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/Wu96YkTUR6s/pPLBMZrlwvYJ', 'http://openwall.com/lists/oss-security/2014/02/18/9', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080', 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'}
null
RubyGems
GHSA-q44r-f2hm-v76v
Moderate severity vulnerability that affects puppet
lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.
{'CVE-2012-3867'}
2022-03-03T05:13:36.382813Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://github.com/advisories/GHSA-q44r-f2hm-v76v', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640', 'https://bugzilla.redhat.com/show_bug.cgi?id=839158', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'http://puppetlabs.com/security/cve/cve-2012-3867/', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'}
null
RubyGems
GHSA-h77x-m5q8-c29h
Moderate severity vulnerability that affects rack
lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
{'CVE-2012-6109'}
2022-03-03T05:13:12.747609Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-835'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=895277', 'https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ', 'https://github.com/advisories/GHSA-h77x-m5q8-c29h', 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5', 'https://github.com/rack/rack/blob/master/README.rdoc', 'http://rack.github.com/', 'https://github.com/rack/rack/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}
null
RubyGems
GHSA-7cgp-c3g7-qvrw
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
{'CVE-2014-0082'}
2022-03-03T05:14:14.700992Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-7cgp-c3g7-qvrw', 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ', 'http://secunia.com/advisories/57836', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://rhn.redhat.com/errata/RHSA-2014-0215.html', 'http://openwall.com/lists/oss-security/2014/02/18/10', 'http://secunia.com/advisories/57376', 'https://puppet.com/security/cve/cve-2014-0082', 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}
null
RubyGems
GHSA-mpxf-gcw2-pw5q
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
{'CVE-2013-6414'}
2022-03-03T05:12:47.022826Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-20'}
{'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ', 'https://github.com/advisories/GHSA-mpxf-gcw2-pw5q', 'https://puppet.com/security/cve/cve-2013-6414', 'http://secunia.com/advisories/57836', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'}
null
RubyGems
GHSA-vp9c-fpxx-744v
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2022-03-03T05:13:51.536077Z
2020-09-23T17:19:55Z
LOW
null
null
{'https://github.com/personnummer/ruby/security/advisories/GHSA-vp9c-fpxx-744v'}
null
RubyGems
GHSA-wfwm-chj7-w59r
Moderate severity vulnerability that affects ox
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.
{'CVE-2017-16229'}
2022-03-03T05:13:27.480722Z
2018-03-05T18:29:32Z
MODERATE
null
{'CWE-125'}
{'https://github.com/advisories/GHSA-wfwm-chj7-w59r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229', 'https://rubygems.org/gems/ox/versions/2.8.1', 'https://github.com/ohler55/ox', 'https://github.com/ohler55/ox/issues/195'}
null
RubyGems
GHSA-7rr7-rcjw-56vj
High severity vulnerability that affects activestorage
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path.
{'CVE-2018-16477'}
2022-03-03T05:13:23.161016Z
2018-12-05T17:17:02Z
MODERATE
null
{'CWE-200'}
{'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ', 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj', 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477'}
null
RubyGems
GHSA-653m-r33x-39ff
Moderate severity vulnerability that affects geminabox
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
{'CVE-2017-16792'}
2022-03-03T05:13:16.322021Z
2017-11-29T23:20:14Z
MODERATE
null
{'CWE-79'}
{'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7', 'https://rubygems.org/gems/geminabox/versions/0.13.10', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://github.com/geminabox/geminabox', 'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md'}
null
RubyGems
GHSA-qxmr-qxh6-2cc9
ReDos vulnerability on guest checkout email validation
### Impact Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. Before the patch, it can be reproduced in the console like this: ```ruby irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@" processing time: 54.293660s => nil ``` To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources. ### Patches Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that: ```bash bin/rails solidus:check_orders_with_invalid_email ``` The above will print information for every affected order if any. ### Workarounds If a prompt upgrade is not an option, please, add the following to `config/application.rb`: ```ruby config.after_initialize do Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP) Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP end ``` ### References - https://en.wikipedia.org/wiki/ReDoS - https://snyk.io/blog/redos-and-catastrophic-backtracking/ ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus. * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
{'CVE-2021-43805'}
2022-03-03T05:13:22.044529Z
2021-12-07T22:01:47Z
HIGH
null
{'CWE-1333'}
{'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}
null
RubyGems
GHSA-x27v-x225-gq8g
Server-Side Request Forgery in Recurly
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
{'CVE-2017-0905'}
2022-03-03T05:13:53.022542Z
2017-12-06T16:43:00Z
CRITICAL
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://github.com/advisories/GHSA-x27v-x225-gq8g', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://github.com/recurly/recurly-client-ruby', 'https://hackerone.com/reports/288635', 'https://dev.recurly.com/page/ruby-updates'}
null
RubyGems
GHSA-49pj-69vf-c689
Incorrect Default Permissions in netaddr
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
{'CVE-2019-17383'}
2022-03-03T05:14:12.069946Z
2019-10-14T21:43:19Z
CRITICAL
null
{'CWE-276'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17383', 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://rubygems.org/gems/netaddr/versions'}
null
RubyGems
GHSA-2j9c-9vmv-7m39
Missing anchor in Rack-Cors allows malicious third party site to perform CORS request
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
{'CVE-2017-11173'}
2022-04-26T18:33:06.302051Z
2018-07-31T18:18:39Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2017-11173', 'https://github.com/cyu/rack-cors', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'http://www.debian.org/security/2017/dsa-3931', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html'}
null
RubyGems
GHSA-rg32-m3hf-772v
Deserialization of Untrusted Data in Slanger
Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3.
{'CVE-2019-1010306'}
2022-03-03T05:13:31.232916Z
2019-07-16T00:41:40Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}
null
RubyGems
GHSA-pf8f-w267-mq2h
The rack-cors rubygem may allow directory traveral
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
{'CVE-2019-18978'}
2022-03-03T05:14:17.661216Z
2019-11-15T20:26:59Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18978', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html', 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4', 'https://usn.ubuntu.com/4571-1/', 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html'}
null
RubyGems
GHSA-4p8f-mmfj-r45g
Cross-site scripting in fat_free_crm
Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb.
{'CVE-2018-20975'}
2022-03-03T05:12:18.531927Z
2019-08-21T16:15:04Z
MODERATE
null
{'CWE-79'}
{'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975', 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1'}
null
RubyGems
GHSA-48w2-rm65-62xx
Inconsistent Interpretation of HTTP Requests in puma
### Impact Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. ### Patches This vulnerability was patched in Puma 5.5.1 and 4.3.9. ### Workarounds This vulnerability only affects Puma installations without any proxy in front. Use a proxy which does not forward LF characters as line endings. Proxies which do not forward LF characters as line endings: * Nginx * Apache (>2.4.25) * Haproxy * Caddy * Traefik ### Possible Breakage If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error. ### References * [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2021-41136'}
2022-03-03T05:13:42.190337Z
2021-10-12T17:53:00Z
LOW
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://github.com/puma/puma/releases/tag/v5.5.1'}
null
RubyGems
GHSA-35mm-cc6r-8fjp
Cross-site scripting in actionpack
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
{'CVE-2020-8264'}
2022-03-03T05:12:21.759781Z
2021-04-07T20:58:47Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/904059', 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'}
null
RubyGems
GHSA-2hxv-mx8x-mcj9
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
{'CVE-2015-4619'}
2022-04-26T18:33:06.216082Z
2018-08-28T22:34:22Z
HIGH
null
{'CWE-352'}
{'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'https://github.com/denkGroot/Spina', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'http://www.securityfocus.com/bid/75216'}
null
RubyGems
GHSA-46j2-xjgp-jrfm
Information disclosure issue in Active Resource
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
{'CVE-2020-8151'}
2022-03-03T05:13:44.971445Z
2020-05-21T21:09:38Z
HIGH
null
{'CWE-863', 'CWE-200'}
{'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://github.com/rails/activeresource', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4H22DZ522HLDS3JX3NX2CXIOZSR/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8151'}
null
RubyGems
GHSA-pcm6-g2qp-9gw8
Cap-Strap gem for Ruby places credentials on the useradd command line
lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process.
{'CVE-2014-4992'}
2022-04-26T18:04:05Z
2018-03-16T01:13:46Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4992', 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/9', 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
null
RubyGems
GHSA-q27f-v3r6-9v77
Improper Certificate Validation in EM-HTTP-Request
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{'CVE-2020-13482'}
2022-03-03T05:13:20.589949Z
2021-05-24T18:13:13Z
HIGH
null
{'CWE-295'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/', 'https://github.com/igrigorik/em-http-request/issues/339', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13482', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/'}
null
RubyGems
GHSA-wjx2-7hqq-8h7m
rails_admin ruby gem XSS vulnerability
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
{'CVE-2020-36190'}
2022-03-03T05:12:39.003321Z
2021-01-14T19:17:16Z
MODERATE
null
{'CWE-79'}
{'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'}
null
RubyGems
GHSA-jc8m-cxhj-668x
Improper Restriction of Excessive Authentication Attempts in Sorcery
### Impact Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout. ### Patches Patched as of version `0.15.0`. ### Workarounds Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`.
{'CVE-2020-11052'}
2022-03-03T05:13:08.974248Z
2020-05-07T21:16:46Z
HIGH
null
{'CWE-307'}
{'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/Sorcery/sorcery/pull/235', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/issues/231'}
null
RubyGems
GHSA-j838-vfpq-fmf2
Moderate severity vulnerability that affects actionpack
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a &#x3a; sequence.
{'CVE-2013-1857'}
2022-03-03T05:13:11.264538Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-j838-vfpq-fmf2', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain', 'https://github.com/rails/rails', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'}
null
RubyGems
GHSA-9v3m-8fp8-mj99
Cross-Site Scripting in bootstrap
Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript. ## Recommendation For `bootstrap` 4.x upgrade to 4.3.1 or later. For `bootstrap` 3.x upgrade to 3.4.1 or later.
{'CVE-2019-8331'}
2022-03-03T05:12:54.587316Z
2019-02-22T20:54:47Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'http://seclists.org/fulldisclosure/2019/May/13', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.securityfocus.com/bid/107375', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://support.f5.com/csp/article/K24383845', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/advisories/GHSA-9v3m-8fp8-mj99', 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/', 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&amp;utm_medium=RSS', 'https://www.npmjs.com/advisories/891', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/pull/28236', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024'}
null
RubyGems
GHSA-67j6-xv27-w6ww
Moderate severity vulnerability that affects web-console
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
{'CVE-2015-3224'}
2022-03-03T05:14:10.034633Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-284'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html', 'http://openwall.com/lists/oss-security/2015/06/16/18', 'https://github.com/rails/web-console', 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown', 'http://www.securityfocus.com/bid/75237', 'https://github.com/advisories/GHSA-67j6-xv27-w6ww', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ'}
null
RubyGems
GHSA-3vfw-7rcp-3xgm
Moderate severity vulnerability that affects actionpack
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
{'CVE-2011-3187'}
2022-03-03T05:12:16.910623Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html', 'https://github.com/advisories/GHSA-3vfw-7rcp-3xgm', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://bugzilla.novell.com/show_bug.cgi?id=673010', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html'}
null
RubyGems
GHSA-8gg6-3r63-25m8
High severity vulnerability that affects git-fastclone
git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories.
{'CVE-2015-8968'}
2022-03-03T05:11:06.863059Z
2018-08-15T20:03:37Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-8968', 'https://github.com/advisories/GHSA-8gg6-3r63-25m8', 'https://hackerone.com/reports/104465', 'https://github.com/square/git-fastclone', 'http://www.securityfocus.com/bid/81433', 'https://github.com/square/git-fastclone/pull/2'}
null
RubyGems
GHSA-mqm2-cgpr-p4m6
Unintended read access in kramdown gem
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
{'CVE-2020-14001'}
2022-04-29T20:33:22.978732Z
2020-08-07T22:27:41Z
CRITICAL
null
{'CWE-862'}
{'https://usn.ubuntu.com/4562-1/', 'https://kramdown.gettalong.org/news.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://www.debian.org/security/2020/dsa-4743', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/', 'https://rubygems.org/gems/kramdown', 'https://kramdown.gettalong.org', 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html', 'https://security.netapp.com/advisory/ntap-20200731-0004/', 'https://github.com/gettalong/kramdown', 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0', 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}
null
RubyGems
GHSA-4whc-pp4x-9pf3
Moderate severity vulnerability that affects jquery-rails and jquery-ujs
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
{'CVE-2015-1840'}
2022-03-03T05:13:19.587035Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-200'}
{'https://github.com/rails/jquery-rails', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html', 'http://www.securityfocus.com/bid/75239', 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'http://openwall.com/lists/oss-security/2015/06/16/15', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840', 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html', 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'}
null
RubyGems
GHSA-6h88-qjpv-p32m
OpenSSL gem for Ruby using inadequate encryption strength
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
{'CVE-2016-7798'}
2022-04-25T16:47:00.898499Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-326'}
{'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798', 'http://www.securityfocus.com/bid/93031', 'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'http://www.openwall.com/lists/oss-security/2016/09/19/9', 'https://github.com/ruby/openssl/issues/49', 'http://www.openwall.com/lists/oss-security/2016/10/01/2', 'https://www.debian.org/security/2017/dsa-3966', 'https://github.com/ruby/openssl'}
null
RubyGems
GHSA-w749-p3v6-hccq
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue.
{'CVE-2022-21831'}
2022-03-11T20:46:53.775228Z
2022-03-08T21:25:54Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://github.com/rails/rails', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI', 'https://rubysec.com/advisories/CVE-2022-21831/'}
null
RubyGems
GHSA-gr44-7grc-37vq
Moderate severity vulnerability that affects activerecord
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request.
{'CVE-2013-0276'}
2022-03-03T05:14:10.481730Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'http://www.osvdb.org/90072', 'http://secunia.com/advisories/52774', 'http://support.apple.com/kb/HT5784', 'http://www.openwall.com/lists/oss-security/2013/02/11/5', 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.debian.org/security/2013/dsa-2620', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://www.securityfocus.com/bid/57896', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://secunia.com/advisories/52112', 'https://github.com/advisories/GHSA-gr44-7grc-37vq'}
null
RubyGems
GHSA-h6rj-8r3c-9gpj
bson is vulnerable to denial of service due to incorrect regex validation
BSON injection vulnerability in the legal function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
{'CVE-2015-4412'}
2022-04-25T22:45:10.830Z
2018-03-05T19:43:21Z
CRITICAL
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1229750', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://github.com/mongodb/bson-ruby', 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'http://www.securityfocus.com/bid/75045'}
null
RubyGems
GHSA-8xfw-5q82-3652
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.1 users should update to spree_auth_devise 4.1.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2021-11-18T19:51:58Z
2021-11-18T20:15:23Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-h8hx-2c5r-32cf
Cross-Site Request Forgery (CSRF) in trestle-auth
### Impact A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. ### Patches The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems. ### For more information If you have any questions or comments about this advisory: * Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues) * Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com)
{'CVE-2021-29435'}
2022-03-03T05:14:00.718340Z
2021-04-13T17:01:50Z
HIGH
null
{'CWE-352'}
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://rubygems.org/gems/trestle-auth'}
null
RubyGems
GHSA-86g5-2wh3-gc9j
Critical severity vulnerability that affects actionview
# File Content Disclosure in Action View Impact ------ There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted code in a controller looks something like this: ``` class UserController < ApplicationController def index render file: "#{Rails.root}/some/file" end end ``` Rendering templates as opposed to files is not impacted by this vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by specifying a format for file rendering, like this: ``` class UserController < ApplicationController def index render file: "#{Rails.root}/some/file", formats: [:html] end end ``` In summary, impacted calls to `render` look like this: ``` render file: "#{Rails.root}/some/file" ``` The vulnerability can be mitigated by changing to this: ``` render file: "#{Rails.root}/some/file", formats: [:html] ``` Other calls to `render` are not impacted. Alternatively, the following monkey patch can be applied in an initializer: ``` $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub
{'CVE-2019-5418'}
2022-03-03T05:14:04.755881Z
2019-03-13T17:26:59Z
HIGH
null
{'CWE-22'}
{'http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5418', 'https://github.com/advisories/GHSA-86g5-2wh3-gc9j', 'https://access.redhat.com/errata/RHSA-2019:1289', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://access.redhat.com/errata/RHSA-2019:1149', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'https://access.redhat.com/errata/RHSA-2019:0796', 'https://www.exploit-db.com/exploits/46585/', 'https://groups.google.com/forum/#!topic/rubyonrails-security/zRNVOUhKHrg', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}
null
RubyGems
GHSA-w542-cpp9-r3g7
CSRF in Field Test
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user. All users running an affected release should upgrade immediately. ## Technical Details Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.
{'CVE-2020-16252'}
2022-03-03T05:14:05.267374Z
2020-08-05T14:53:34Z
MODERATE
null
{'CWE-352'}
{'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0', 'https://rubygems.org/gems/field_test', 'https://github.com/ankane/field_test/issues/28', 'https://github.com/ankane/field_test', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252'}
null
RubyGems
GHSA-4vf4-qmvg-mh7h
Cookie prefix spoofing in CGI
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
{'CVE-2021-41819'}
2022-03-03T05:13:28.201777Z
2022-01-21T23:22:17Z
HIGH
null
{'CWE-565'}
{'https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/', 'https://hackerone.com/reports/910552', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819', 'https://security.netapp.com/advisory/ntap-20220121-0003/'}
null
RubyGems
GHSA-fj7f-vq84-fh43
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash. ### Exploitation To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside. ### Impact This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags). This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on. ### Patches Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. ### Workarounds Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code. ### References https://cwe.mitre.org/data/definitions/88.html
{'CVE-2021-43809'}
2022-03-03T05:13:05.052325Z
2021-12-08T19:51:36Z
MODERATE
null
{'CWE-88'}
{'https://github.com/rubygems/rubygems', 'https://github.com/rubygems/rubygems/pull/5142', 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809'}
null
RubyGems
GHSA-hwhf-64mh-r662
ReDoS vulnerability in parser_apache2
### Impact parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. ### Patches v1.14.2 ### Workarounds Either of the following: * Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache. * Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd). ### References * [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186) * [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662) * [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/) * https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
{'CVE-2021-41186'}
2022-03-03T05:13:55.219469Z
2021-11-01T19:16:31Z
MODERATE
null
{'CWE-400'}
{'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142', 'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662', 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md', 'https://github.com/fluent/fluentd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186'}
null
RubyGems
GHSA-6x85-j5j2-27jx
Moderate severity vulnerability that affects actionpack
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
{'CVE-2014-0130'}
2022-03-03T05:13:31.344632Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-22'}
{'http://www.securityfocus.com/bid/67244', 'http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130', 'https://github.com/advisories/GHSA-6x85-j5j2-27jx'}
null
RubyGems
GHSA-wpw7-wxjm-cw8r
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
{'CVE-2013-6417'}
2022-03-03T05:12:53.208388Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417', 'https://puppet.com/security/cve/cve-2013-6417', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://github.com/advisories/GHSA-wpw7-wxjm-cw8r', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-0469.html', 'http://www.debian.org/security/2014/dsa-2888', 'https://github.com/rails/rails'}
null
RubyGems
GHSA-6wpv-cj6x-v3jw
Moderate severity vulnerability that affects http
The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack.
{'CVE-2015-1828'}
2022-03-03T05:14:09.021079Z
2018-03-13T16:15:57Z
MODERATE
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-6wpv-cj6x-v3jw', 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1828', 'https://github.com/ruby/openssl/issues/8', 'https://rubysec.com/advisories/http-CVE-2015-1828'}
null
RubyGems
GHSA-p4c6-77gc-694x
Moderate severity vulnerability that affects rails
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
{'CVE-2007-6077'}
2022-03-03T05:13:15.697188Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-362'}
{'http://dev.rubyonrails.org/changeset/8177', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'http://dev.rubyonrails.org/ticket/10048', 'http://secunia.com/advisories/27781', 'http://www.vupen.com/english/advisories/2007/4009', 'https://github.com/advisories/GHSA-p4c6-77gc-694x', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://www.securityfocus.com/bid/26598', 'http://secunia.com/advisories/28136', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077', 'http://www.vupen.com/english/advisories/2007/4238'}
null
RubyGems
GHSA-3pxh-h8hw-mj8w
Moderate severity vulnerability that affects rack
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
{'CVE-2013-0183'}
2022-03-03T05:12:52.510484Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-119'}
{'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'http://rack.github.com/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack', 'https://bugzilla.redhat.com/show_bug.cgi?id=895282', 'http://www.debian.org/security/2013/dsa-2783', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}
null
RubyGems
GHSA-m42h-mh85-4qgc
Moderate severity vulnerability that affects railties
# Possible Remote Code Execution Exploit in Rails Development Mode Impact ------ With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations. Workarounds ----------- This issue can be mitigated by specifying a secret key in development mode. In "config/environments/development.rb" add this: ``` config.secret_key_base = SecureRandom.hex(64) ``` Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to ooooooo_q
{'CVE-2019-5420'}
2022-03-03T05:13:42.419962Z
2019-03-13T17:28:35Z
CRITICAL
null
{'CWE-330', 'CWE-77'}
{'http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-m42h-mh85-4qgc', 'https://www.exploit-db.com/exploits/46785/', 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5420', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}
null
RubyGems
GHSA-vqcq-mrmw-mcmg
Rubyzip gem contains a Directory Traversal vulnerability in zip file component
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem.. This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete.
{'CVE-2018-1000544'}
2022-04-26T18:48:01.089130Z
2018-09-06T03:27:18Z
CRITICAL
null
{'CWE-59', 'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544', 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html', 'https://github.com/advisories/GHSA-vqcq-mrmw-mcmg', 'https://github.com/rubyzip/rubyzip', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html', 'https://access.redhat.com/errata/RHSA-2018:3466', 'https://github.com/rubyzip/rubyzip/issues/369'}
null
RubyGems
GHSA-q759-hwvc-m3jg
Moderate severity vulnerability that affects actionpack
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
{'CVE-2013-1855'}
2022-03-03T05:14:06.929685Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://support.apple.com/kb/HT5784', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://github.com/advisories/GHSA-q759-hwvc-m3jg', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}
null
RubyGems
GHSA-cm9w-c4rj-r2cf
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.29.1 and 2.49.1 have been released and fully mitigate the vulnerability. Avoid passing user input to the `translate` function, or sanitize the inputs before passing them. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [github/view_component](http://github.com/github/view_component) project
{'CVE-2022-24722'}
2022-03-11T20:16:47.644105Z
2022-03-02T22:24:05Z
HIGH
null
{'CWE-79'}
{'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_component/releases/tag/v2.31.2', 'https://github.com/github/view_component/', 'https://github.com/github/view_component/releases/tag/v2.49.1'}
null
RubyGems
GHSA-78rc-8c29-p45g
High severity vulnerability that affects actionpack
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
{'CVE-2016-2098'}
2022-03-03T05:14:08.754441Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-20'}
{'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://www.securitytracker.com/id/1035122', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://www.securityfocus.com/bid/83725', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098', 'https://www.exploit-db.com/exploits/40086/', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html', 'http://www.debian.org/security/2016/dsa-3509', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'https://github.com/advisories/GHSA-78rc-8c29-p45g', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
null
RubyGems
GHSA-p673-hjf2-pwfr
High severity vulnerability that affects command_wrap
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
{'CVE-2013-1875'}
2022-03-03T05:13:00.466412Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-1875', 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html', 'http://seclists.org/fulldisclosure/2013/Mar/175', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://www.osvdb.org/91450', 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'}
null
RubyGems
GHSA-5cqm-crxm-6qpv
Buffer overrun vulnerability in CGI
A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows. Please update the cgi gem to version 0.3.1, 0.2,1, and 0.1,1 or later. You can use gem update cgi to update it. If you are using bundler, please add gem "cgi", ">= 0.3.1" to your Gemfile. Alternatively, please update Ruby to 2.7.5 or 3.0.3. This issue has been introduced since Ruby 2.7, so the cgi version bundled with Ruby 2.6 is not vulnerable.
{'CVE-2021-41816'}
2022-05-02T15:06:43.287487Z
2021-12-14T21:36:20Z
CRITICAL
null
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41816', 'https://hackerone.com/reports/1328463', 'https://github.com/ruby/cgi', 'https://security-tracker.debian.org/tracker/CVE-2021-41816', 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/', 'https://security.netapp.com/advisory/ntap-20220303-0006/', 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'}
null
RubyGems
GHSA-7359-3c6r-hfc2
Improper Certificate Validation in oauth ruby gem
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{'CVE-2016-11086'}
2022-03-03T05:14:19.515545Z
2021-04-22T16:22:15Z
HIGH
null
{'CWE-295'}
{'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby', 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'}
null
RubyGems
GHSA-2p5p-m353-833w
Sort order SQL injection in Administrate
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication. This is patched in wersion 0.13.0.
{'CVE-2020-5257'}
2022-03-03T05:13:51.867939Z
2020-03-13T21:05:44Z
HIGH
null
{'CWE-943'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'}
null
RubyGems
GHSA-gqvf-892r-vjm5
Improper Certificate Validation in Puppet
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.
{'CVE-2020-7942'}
2022-03-03T05:13:24.756263Z
2021-04-13T15:42:19Z
MODERATE
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7942', 'https://puppet.com/security/cve/CVE-2020-7942/'}
null
RubyGems
GHSA-g8ww-46x2-2p65
Denial of Service in Action Dispatch
Impact ------ There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue. ```ruby module Mime class Type MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/ end end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series * 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Security Curious <security...@pm.me> for reporting this!
{'CVE-2021-22902'}
2022-03-03T05:12:44.665390Z
2021-05-05T19:48:21Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22902', 'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866', 'https://groups.google.com/g/rubyonrails-security/c/_5ID_ld9u1c', 'https://hackerone.com/reports/1138654', 'https://github.com/rails/rails/releases/tag/v6.0.3.7'}
null
RubyGems
GHSA-f93j-hmcr-jcwh
Data Injection Vulnerability in moped Rubygem
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
{'CVE-2015-4410'}
2022-03-03T05:13:23.301091Z
2020-08-19T16:45:49Z
HIGH
null
{'CWE-20'}
{'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://rubygems.org/gems/moped/versions', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://www.securityfocus.com/bid/75045', 'https://seclists.org/oss-sec/2015/q2/653', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'https://github.com/mongoid/moped/', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'http://www.securityfocus.com/bid/75045'}
null
RubyGems
GHSA-7fqj-cg79-f2pv
High severity vulnerability that affects thumbshooter
lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
{'CVE-2013-1898'}
2022-03-03T05:13:44.429367Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html', 'http://osvdb.org/91839', 'http://www.openwall.com/lists/oss-security/2013/03/26/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898', 'http://www.openwall.com/lists/oss-security/2013/03/26/3', 'http://seclists.org/fulldisclosure/2013/Mar/218', 'https://github.com/advisories/GHSA-7fqj-cg79-f2pv'}
null
RubyGems
GHSA-r9c2-cr39-c8g6
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
{'CVE-2015-7579'}
2022-03-03T05:14:07.427612Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ', 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f', 'https://github.com/advisories/GHSA-r9c2-cr39-c8g6', 'http://www.openwall.com/lists/oss-security/2016/01/25/12', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://github.com/rails/rails-html-sanitizer', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}
null
RubyGems
GHSA-jg4m-q6w8-vrjp
High severity vulnerability that affects rgpg
The self.run_gpg function in lib/rgpg/gpg_helper.rb in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
{'CVE-2013-4203'}
2022-03-03T05:14:16.169786Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'https://github.com/rcook/rgpg', 'http://www.openwall.com/lists/oss-security/2013/08/03/2', 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505', 'https://github.com/advisories/GHSA-jg4m-q6w8-vrjp', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}
null
RubyGems
GHSA-73rf-6mrf-759q
Moderate severity vulnerability that affects devise
Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to `increment_failed_attempts` within the `Devise::Models::Lockable` class not being concurrency safe.
{'CVE-2019-5421'}
2022-03-03T05:13:04.249599Z
2019-03-19T18:03:25Z
MODERATE
null
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5421', 'https://github.com/plataformatec/devise/pull/4996', 'https://github.com/plataformatec/devise/issues/4981', 'https://github.com/advisories/GHSA-73rf-6mrf-759q'}
null
RubyGems
GHSA-f2c9-5jqw-3xh3
Cross-Site Scripting in Qiita::Markdown
Increments Qiita::Markdown before 0.33.0 allows XSS in transformers.
{'CVE-2021-28796'}
2022-03-03T05:12:48.680737Z
2021-08-02T17:23:39Z
MODERATE
null
{'CWE-79'}
{'https://vuln.ryotak.me/advisories/15', 'https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28796'}
null
RubyGems
GHSA-wmjf-jpjj-9f3j
Low severity vulnerability that affects rubocop
RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.
{'CVE-2017-8418'}
2022-03-03T05:12:59.168178Z
2017-11-15T20:39:47Z
LOW
null
{'CWE-668'}
{'https://github.com/bbatsov/rubocop', 'http://www.openwall.com/lists/oss-security/2017/05/01/14', 'https://github.com/advisories/GHSA-wmjf-jpjj-9f3j', 'https://github.com/bbatsov/rubocop/issues/4336', 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}
null
RubyGems
GHSA-69p6-wvmq-27gg
Command injection in ruby-git
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-25648'}
2022-04-28T21:15:34.260781Z
2022-04-20T00:00:33Z
CRITICAL
null
{'CWE-88'}
{'https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0', 'https://github.com/ruby-git/ruby-git/pull/569', 'https://github.com/ruby-git/ruby-git', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648', 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270'}
null
RubyGems
GHSA-694m-jhr9-pf77
High severity vulnerability that affects doorkeeper
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.
{'CVE-2018-1000211'}
2022-03-03T05:13:32.815197Z
2018-08-13T20:46:41Z
HIGH
null
{'CWE-732'}
{'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211', 'https://github.com/doorkeeper-gem/doorkeeper/issues/891', 'https://github.com/advisories/GHSA-694m-jhr9-pf77'}
null
RubyGems
GHSA-h5g2-38x9-4gv3
High severity vulnerability that affects archive-tar-minitar and minitar
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
{'CVE-2016-10173'}
2022-03-03T05:13:07.674662Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2017/01/24/7', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'http://www.openwall.com/lists/oss-security/2017/01/29/1', 'https://github.com/halostatue/minitar/issues/16', 'https://puppet.com/security/cve/cve-2016-10173', 'https://github.com/halostatue/minitar', 'http://www.debian.org/security/2017/dsa-3778', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173', 'https://security.gentoo.org/glsa/201702-32', 'http://www.securityfocus.com/bid/95874'}
null
RubyGems
GHSA-v222-6mr4-qj29
Command Injection vulnerability in asciidoctor-include-ext
### Impact Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. ~~This attack is possible even when `allow-uri-read` is disabled!~~ (EDIT: it’s not) ### Patches The vulnerability has been fixed in commit c7ea001 (and further improved in cbaccf3), which is included in version [0.4.0](https://rubygems.org/gems/asciidoctor-include-ext/versions/0.4.0). ### Workarounds ```rb require 'asciidoctor/include_ext' class Asciidoctor::IncludeExt::IncludeProcessor # Overrides superclass private method to mitigate Command Injection # vulnerability in asciidoctor-include-ext <0.4.0. def target_uri?(target) target.downcase.start_with?('http://', 'https://') \ && URI.parse(target).is_a?(URI::HTTP) rescue URI::InvalidURIError false end end ``` ### References * https://sakurity.com/blog/2015/02/28/openuri.html ### Credits This vulnerability was discovered by Joern Schneeweisz from the GitLab Security Research Team. ### For more information See commit message c7ea001. If you have any questions or comments about this advisory open an issue in [jirutka/asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext/issues/).
{'CVE-2022-24803'}
2022-04-18T22:32:08.086487Z
2022-03-31T23:27:15Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://github.com/jirutka/asciidoctor-include-ext'}
null
RubyGems
GHSA-vvff-6wrr-4g7q
Missing Authentication for Critical Function in Foreman Ansible
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-3589'}
2022-04-05T19:31:57.898132Z
2022-03-24T00:00:17Z
CRITICAL
null
{'CWE-306'}
{'https://access.redhat.com/security/cve/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265'}
null
RubyGems
GHSA-85rf-xh54-whp3
Malicious URL drafting attack against iodines static file server may allow path traversal
### Impact A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version. Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder. ### Patches The vulnerability was patched in version 0.7.34. Please upgrade to the latest version. ### Workarounds A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically). However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes. ### For more information If you have any questions or comments about this advisory: * Email [Boaz Segev](https://github.com/boazsegev)
null
2022-03-03T05:13:29.632570Z
2019-10-07T16:52:13Z
LOW
null
{'CWE-22'}
{'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/boazsegev/iodine'}
null
RubyGems
GHSA-g45g-g52h-39rg
Cross-site Scripting in Chartkick
The Chartkick gem through 3.1.0 for Ruby allows XSS.
{'CVE-2019-12732'}
2022-03-03T05:14:01.003551Z
2019-06-07T20:56:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/ankane/chartkick/issues/488', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}
null
RubyGems
GHSA-8hc4-xxm3-5ppp
Regular Expression Denial-of-Service
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
{'CVE-2021-22880'}
2022-03-03T05:10:58.783773Z
2021-03-02T03:44:14Z
HIGH
null
{'CWE-400'}
{'https://rubygems.org/gems/activerecord', 'https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/', 'https://hackerone.com/reports/1023899', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22880', 'https://www.debian.org/security/2021/dsa-4929'}
null