ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
RubyGems | GHSA-fmx4-26r3-wxpf | Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption | ### Impact
CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution.
If affected versions of CommonMarker are used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE).
### Patches
This vulnerability has been patched in the following CommonMarker release:
- v0.23.4
### Workarounds
The vulnerability exists in the table markdown extensions of `cmark-gfm`. Disabling any use of the table extension will prevent this vulnerability from being triggered.
### References
- https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x
### Acknowledgements
We would like to thank Felix Wilhelm of Google's Project Zero for reporting this vulnerability
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CommonMarker](http://github.com/gjtorikian/commonmarker) | null | 2022-03-07T20:47:53.775868Z | 2022-03-03T20:28:47Z | HIGH | null | {'CWE-190'} | {'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e5fc6aed3', 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x', 'https://github.com/gjtorikian/commonmarker', 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'} | null |
RubyGems | GHSA-75w6-p6mg-vh8j | Moderate severity vulnerability that affects rails | Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value. | {'CVE-2011-0446'} | 2022-03-03T05:14:10.012590Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-75w6-p6mg-vh8j', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://www.vupen.com/english/advisories/2011/0877', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446', 'http://www.debian.org/security/2011/dsa-2247', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://secunia.com/advisories/43666', 'http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&output=gplain', 'http://www.securityfocus.com/bid/46291', 'http://www.vupen.com/english/advisories/2011/0587', 'http://www.securitytracker.com/id?1025064', 'http://secunia.com/advisories/43274'} | null |
RubyGems | GHSA-mhwp-qhpc-h3jm | High severity vulnerability that affects activerecord | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting. | {'CVE-2014-3482'} | 2022-03-03T05:14:07.238128Z | 2017-10-24T18:33:36Z | HIGH | null | {'CWE-89'} | {'http://www.debian.org/security/2014/dsa-2982', 'https://github.com/advisories/GHSA-mhwp-qhpc-h3jm', 'http://openwall.com/lists/oss-security/2014/07/02/5', 'http://secunia.com/advisories/59973', 'http://www.securityfocus.com/bid/68343', 'http://rhn.redhat.com/errata/RHSA-2014-0876.html', 'http://secunia.com/advisories/60214', 'http://secunia.com/advisories/60763', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'} | null |
RubyGems | GHSA-fjfg-q662-gm6j | Moderate severity vulnerability that affects rails | Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file. | {'CVE-2007-5379'} | 2022-03-03T05:14:16.166604Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-200'} | {'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'https://github.com/advisories/GHSA-fjfg-q662-gm6j', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'http://www.vupen.com/english/advisories/2007/3508', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://secunia.com/advisories/27657', 'http://www.securityfocus.com/bid/26096', 'http://docs.info.apple.com/article.html?artnum=307179', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379', 'http://dev.rubyonrails.org/ticket/8453', 'http://osvdb.org/40717', 'http://secunia.com/advisories/28136', 'http://www.vupen.com/english/advisories/2007/4238'} | null |
RubyGems | GHSA-rhgq-vv9x-j4p5 | lawn-login exposes database password to unauthorized users | The login function in lib/lawn.rb in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. | {'CVE-2014-5000'} | 2022-04-25T22:13:42Z | 2018-01-22T23:45:33Z | HIGH | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-rhgq-vv9x-j4p5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5000', 'http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html'} | null |
RubyGems | GHSA-g266-3crh-h7gj | Moderate severity vulnerability that affects ldoce | lib/ldoce/word.rb in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name. | {'CVE-2013-1911'} | 2022-03-03T05:13:31.251909Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-20'} | {'http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html', 'http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.html', 'http://osvdb.org/91870', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163', 'http://www.openwall.com/lists/oss-security/2013/03/31/3', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911', 'http://www.securityfocus.com/bid/58783', 'https://github.com/advisories/GHSA-g266-3crh-h7gj'} | null |
RubyGems | GHSA-cj92-c4fj-w9c5 | Moderate severity vulnerability that affects mail | Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a .. (dot dot) in the to parameter. | {'CVE-2012-2139'} | 2022-03-03T05:14:05.088425Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-22'} | {'https://github.com/mikel/mail', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html', 'http://secunia.com/advisories/48970', 'https://github.com/advisories/GHSA-cj92-c4fj-w9c5', 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f', 'https://bugzilla.redhat.com/show_bug.cgi?id=816352', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'http://www.openwall.com/lists/oss-security/2012/04/26/1', 'http://www.openwall.com/lists/oss-security/2012/04/25/8', 'https://bugzilla.novell.com/show_bug.cgi?id=759092', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'} | null |
RubyGems | GHSA-ww79-8xwv-932x | Moderate severity vulnerability that affects rbovirt | The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors. | {'CVE-2014-0036'} | 2022-03-03T05:13:01.436612Z | 2017-10-24T18:33:36Z | MODERATE | null | null | {'http://seclists.org/oss-sec/2014/q1/509', 'https://github.com/advisories/GHSA-ww79-8xwv-932x', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html'} | null |
RubyGems | GHSA-h56m-vwxc-3qpw | Moderate severity vulnerability that affects actionpack | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818. | {'CVE-2014-7829'} | 2022-03-03T05:13:48.955186Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-22'} | {'https://github.com/advisories/GHSA-h56m-vwxc-3qpw', 'http://www.securityfocus.com/bid/71183', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829', 'https://puppet.com/security/cve/cve-2014-7829', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ'} | null |
RubyGems | GHSA-m2jr-hmc3-qmpr | Authorization bypass in Spree | ### Impact
The perpetrator could query the [API v2 Order Status](https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status) endpoint with an empty string passed as an Order token
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
### References
Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org) | {'CVE-2020-26223'} | 2022-03-03T05:14:16.962010Z | 2020-11-13T17:18:22Z | HIGH | null | {'CWE-863'} | {'https://rubygems.org/gems/spree_api/versions', 'https://guides.spreecommerce.org/api/v2/storefront#tag/Order-Status', 'https://github.com/spree/spree/pull/10573', 'https://github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26223'} | null |
RubyGems | GHSA-4hpq-rjcx-7vj9 | Open Redirect in clearance | This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com). | {'CVE-2021-23435'} | 2022-03-03T05:13:18.797869Z | 2021-09-13T20:05:09Z | HIGH | null | {'CWE-601'} | {'https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284', 'https://github.com/thoughtbot/clearance', 'https://github.com/thoughtbot/clearance/pull/945', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23435'} | null |
RubyGems | GHSA-hjg4-8q5f-x6fm | Information Disclosure / Unintended Method Execution in Action Pack | Impact
------
There is a possible information disclosure / unintended method execution
vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url`
helper with untrusted user input.
Vulnerable code will look like this.
```
redirect_to(params[:some_param])
```
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The FIXED releases are available at the normal locations.
Workarounds
-----------
To work around this problem, it is recommended to use an allow list for valid
parameters passed from the user. For example,
```
private def check(param)
case param
when "valid"
param
else
"/"
end
end
def index
redirect_to(check(params[:some_param]))
end
```
Or force the user input to be cast to a string like this,
```
def index
redirect_to(params[:some_param].to_s)
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 5-2-information-disclosure.patch - Patch for 5.2 series
* 6-0-information-disclosure.patch - Patch for 6.0 series
* 6-1-information-disclosure.patch - Patch for 6.1 series
Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users
of earlier unsupported releases are advised to upgrade as soon as possible as we
cannot guarantee the continued availability of security fixes for unsupported
releases.
Credits
-------
Thanks to Benoit Côté-Jodoin from Shopify for reporting this. | {'CVE-2021-22885'} | 2022-04-07T15:17:01.240074Z | 2021-05-05T19:49:02Z | HIGH | null | {'CWE-200', 'CWE-209'} | {'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22885', 'https://github.com/rails/rails/releases/tag/v5.2.4.6', 'https://groups.google.com/g/rubyonrails-security/c/NiQl-48cXYI', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://www.debian.org/security/2021/dsa-4929', 'https://hackerone.com/reports/1106652', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://github.com/rails/rails/releases/tag/v6.0.3.7'} | null |
RubyGems | GHSA-rgr4-9jh5-j4j6 | Moderate severity vulnerability that affects rack | lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth. | {'CVE-2015-3225'} | 2022-03-03T05:13:23.170849Z | 2017-10-24T18:33:36Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-rgr4-9jh5-j4j6', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html', 'https://github.com/rack/rack/blob/master/HISTORY.md', 'http://rhn.redhat.com/errata/RHSA-2015-2290.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html', 'http://www.debian.org/security/2015/dsa-3322', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html', 'http://www.securityfocus.com/bid/75232', 'http://openwall.com/lists/oss-security/2015/06/16/14', 'https://github.com/rack/rack', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/gcUbICUmKMc/qiCotVZwXrMJ', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html'} | null |
RubyGems | GHSA-pr3r-4wrp-r2pv | ActiveRecord in Ruby on Rails allows database-query bypass | Action Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. | {'CVE-2016-6317'} | 2022-04-25T16:47:04.063958Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-284', 'CWE-476'} | {'http://www.securityfocus.com/bid/92434', 'http://www.openwall.com/lists/oss-security/2016/08/11/4', 'https://github.com/advisories/GHSA-pr3r-4wrp-r2pv', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'} | null |
RubyGems | GHSA-px3r-jm9g-c8w8 | Moderate severity vulnerability that affects rails-html-sanitizer | There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately. | {'CVE-2018-3741'} | 2022-03-03T05:14:12.117468Z | 2018-04-26T15:41:10Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3741', 'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae', 'https://github.com/advisories/GHSA-px3r-jm9g-c8w8'} | null |
RubyGems | GHSA-fg9w-g6m4-557j | Moderate severity vulnerability that affects rails | A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. | {'CVE-2009-3086'} | 2022-03-03T05:12:50.229729Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-200'} | {'http://www.vupen.com/english/advisories/2009/2544', 'http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails', 'http://secunia.com/advisories/36600', 'http://www.securityfocus.com/bid/37427', 'https://github.com/advisories/GHSA-fg9w-g6m4-557j', 'http://www.debian.org/security/2011/dsa-2260', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'} | null |
RubyGems | GHSA-crjr-9rc5-ghw8 | Inefficient Regular Expression Complexity in Nokogiri | ## Summary
Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
## References
[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html) Inefficient Regular Expression Complexity
## Credit
This vulnerability was reported by HackerOne user ooooooo_q (ななおく).
| {'CVE-2022-24836'} | 2022-04-26T18:17:12.810194Z | 2022-04-11T21:18:06Z | HIGH | null | {'CWE-1333', 'CWE-400'} | {'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/', 'https://github.com/sparklemotion/nokogiri'} | null |
RubyGems | GHSA-4xjh-m3qx-49wc | Jekyll allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file | Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the "include" key in the "_config.yml" file. | {'CVE-2018-17567'} | 2022-04-26T18:48:02.306289Z | 2018-09-28T19:29:07Z | HIGH | null | {'CWE-59'} | {'https://github.com/jekyll/jekyll/pull/7224', 'https://github.com/jekyll/jekyll/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17567', 'https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/', 'https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984@%3Ccommits.accumulo.apache.org%3E', 'https://github.com/advisories/GHSA-4xjh-m3qx-49wc'} | null |
RubyGems | GHSA-94hm-8q65-rmxm | High severity vulnerability that affects omniauth-saml | OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | {'CVE-2017-11430'} | 2022-03-03T05:14:10.610449Z | 2019-07-05T21:11:43Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-11430', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445', 'https://github.com/advisories/GHSA-94hm-8q65-rmxm'} | null |
RubyGems | GHSA-w64w-qqph-5gxm | HTTP Smuggling via Transfer-Encoding Header in Puma | ### Impact
This is a similar but different vulnerability to the one patched in 3.12.5 and 4.3.4.
A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
### Patches
The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy) | {'CVE-2020-11077'} | 2022-03-03T05:13:06.003444Z | 2020-05-22T14:55:09Z | MODERATE | null | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11077', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'} | null |
RubyGems | GHSA-hgpp-pp89-4fgf | Moderate severity vulnerability that affects actionpack | actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2694. | {'CVE-2012-2660'} | 2022-03-03T05:14:08.475578Z | 2017-10-24T18:33:38Z | MODERATE | null | null | {'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://github.com/advisories/GHSA-hgpp-pp89-4fgf', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660', 'https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain', 'https://github.com/rails/rails'} | null |
RubyGems | GHSA-5f9h-9pjv-v6j7 | Directory traversal in Rack::Directory app bundled with Rack | A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure. | {'CVE-2020-8161'} | 2022-03-03T05:13:05.884012Z | 2020-07-06T21:31:02Z | MODERATE | null | {'CWE-548'} | {'https://hackerone.com/reports/434404', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8161', 'https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA', 'https://usn.ubuntu.com/4561-1/', 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e', 'https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8161.yml'} | null |
RubyGems | GHSA-r23g-3qw4-gfh2 | Moderate severity vulnerability that affects redcloth | Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a javascript: URI. | {'CVE-2012-6684'} | 2022-03-07T20:46:58.986873Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'http://co3k.org/blog/redcloth-unfixed-xss-en', 'http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss', 'https://gist.github.com/co3k/75b3cb416c342aa1414c', 'http://www.debian.org/security/2015/dsa-3168', 'https://github.com/advisories/GHSA-r23g-3qw4-gfh2', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684', 'http://seclists.org/fulldisclosure/2014/Dec/50'} | null |
RubyGems | GHSA-92w9-2pqw-rhjj | Moderate severity vulnerability that affects actionpack | The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a with_http_digest helper method, as demonstrated by the authenticate_or_request_with_http_digest method. | {'CVE-2012-3424'} | 2022-03-03T05:13:03.821814Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-287'} | {'http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/', 'https://github.com/advisories/GHSA-92w9-2pqw-rhjj', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'} | null |
RubyGems | GHSA-pcqq-5962-hvcw | Denial of Service in uap-core when processing crafted User-Agent strings | ### Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
### Patches
Please update `uap-ruby` to >= v2.6.0
### For more information
https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p
Reported in `uap-core` by Ben Caller @bcaller | null | 2022-03-03T05:14:03.085188Z | 2020-03-10T18:02:49Z | HIGH | null | null | {'https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw', 'https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a'} | null |
RubyGems | GHSA-6h5q-96hp-9jgm | Moderate severity vulnerability that affects actionpack | Cross-site scripting (XSS) vulnerability in the number_to_currency helper in actionpack/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter. | {'CVE-2013-6415'} | 2022-03-03T05:13:06.913595Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-79'} | {'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'https://puppet.com/security/cve/cve-2013-6415', 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html', 'http://secunia.com/advisories/56093', 'http://www.securityfocus.com/bid/64077'} | null |
RubyGems | GHSA-g98m-96g9-wfjq | Insecure path handling in Bundler | Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed. | {'CVE-2019-3881'} | 2022-03-03T05:12:42.465042Z | 2021-05-10T14:53:59Z | HIGH | null | {'CWE-427', 'CWE-552'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3881', 'https://github.com/rubygems/bundler/issues/6501', 'https://github.com/rubygems/bundler/pull/7416/commits/65cfebb041c454c246aaf32a177b0243915a9998', 'https://github.com/rubygems/bundler', 'https://bugzilla.redhat.com/show_bug.cgi?id=1651826'} | null |
RubyGems | GHSA-hqf9-rc9j-5fmj | Moderate severity vulnerability that affects activerecord | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving \ (backslash) characters that are not properly handled in operations on array columns. | {'CVE-2014-0080'} | 2022-03-03T05:13:22.115718Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-89'} | {'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/Wu96YkTUR6s/pPLBMZrlwvYJ', 'http://openwall.com/lists/oss-security/2014/02/18/9', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080', 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'} | null |
RubyGems | GHSA-q44r-f2hm-v76v | Moderate severity vulnerability that affects puppet | lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences. | {'CVE-2012-3867'} | 2022-03-03T05:13:36.382813Z | 2017-10-24T18:33:37Z | MODERATE | null | null | {'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://github.com/advisories/GHSA-q44r-f2hm-v76v', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640', 'https://bugzilla.redhat.com/show_bug.cgi?id=839158', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'http://puppetlabs.com/security/cve/cve-2012-3867/', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'} | null |
RubyGems | GHSA-h77x-m5q8-c29h | Moderate severity vulnerability that affects rack | lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header. | {'CVE-2012-6109'} | 2022-03-03T05:13:12.747609Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-835'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=895277', 'https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ', 'https://github.com/advisories/GHSA-h77x-m5q8-c29h', 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5', 'https://github.com/rack/rack/blob/master/README.rdoc', 'http://rack.github.com/', 'https://github.com/rack/rack/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'} | null |
RubyGems | GHSA-7cgp-c3g7-qvrw | Moderate severity vulnerability that affects actionpack | actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers. | {'CVE-2014-0082'} | 2022-03-03T05:14:14.700992Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-7cgp-c3g7-qvrw', 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ', 'http://secunia.com/advisories/57836', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://rhn.redhat.com/errata/RHSA-2014-0215.html', 'http://openwall.com/lists/oss-security/2014/02/18/10', 'http://secunia.com/advisories/57376', 'https://puppet.com/security/cve/cve-2014-0082', 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'} | null |
RubyGems | GHSA-mpxf-gcw2-pw5q | Moderate severity vulnerability that affects actionpack | actionpack/lib/action_view/lookup_context.rb in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching. | {'CVE-2013-6414'} | 2022-03-03T05:12:47.022826Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-20'} | {'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ', 'https://github.com/advisories/GHSA-mpxf-gcw2-pw5q', 'https://puppet.com/security/cve/cve-2013-6414', 'http://secunia.com/advisories/57836', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'} | null |
RubyGems | GHSA-vp9c-fpxx-744v | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2022-03-03T05:13:51.536077Z | 2020-09-23T17:19:55Z | LOW | null | null | {'https://github.com/personnummer/ruby/security/advisories/GHSA-vp9c-fpxx-744v'} | null |
RubyGems | GHSA-wfwm-chj7-w59r | Moderate severity vulnerability that affects ox | In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse. | {'CVE-2017-16229'} | 2022-03-03T05:13:27.480722Z | 2018-03-05T18:29:32Z | MODERATE | null | {'CWE-125'} | {'https://github.com/advisories/GHSA-wfwm-chj7-w59r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229', 'https://rubygems.org/gems/ox/versions/2.8.1', 'https://github.com/ohler55/ox', 'https://github.com/ohler55/ox/issues/195'} | null |
RubyGems | GHSA-7rr7-rcjw-56vj | High severity vulnerability that affects activestorage | A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. | {'CVE-2018-16477'} | 2022-03-03T05:13:23.161016Z | 2018-12-05T17:17:02Z | MODERATE | null | {'CWE-200'} | {'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ', 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj', 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477'} | null |
RubyGems | GHSA-653m-r33x-39ff | Moderate severity vulnerability that affects geminabox | Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb. | {'CVE-2017-16792'} | 2022-03-03T05:13:16.322021Z | 2017-11-29T23:20:14Z | MODERATE | null | {'CWE-79'} | {'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7', 'https://rubygems.org/gems/geminabox/versions/0.13.10', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://github.com/geminabox/geminabox', 'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md'} | null |
RubyGems | GHSA-qxmr-qxh6-2cc9 | ReDos vulnerability on guest checkout email validation | ### Impact
Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`.
Before the patch, it can be reproduced in the console like this:
```ruby
irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@"
processing time: 54.293660s
=> nil
```
To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources.
### Patches
Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression.
There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that:
```bash
bin/rails solidus:check_orders_with_invalid_email
```
The above will print information for every affected order if any.
### Workarounds
If a prompt upgrade is not an option, please, add the following to `config/application.rb`:
```ruby
config.after_initialize do
Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP)
Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP
end
```
### References
- https://en.wikipedia.org/wiki/ReDoS
- https://snyk.io/blog/redos-and-catastrophic-backtracking/
### For more information
If you have any questions or comments about this advisory:
* Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus.
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
| {'CVE-2021-43805'} | 2022-03-03T05:13:22.044529Z | 2021-12-07T22:01:47Z | HIGH | null | {'CWE-1333'} | {'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'} | null |
RubyGems | GHSA-x27v-x225-gq8g | Server-Side Request Forgery in Recurly | The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources. | {'CVE-2017-0905'} | 2022-03-03T05:13:53.022542Z | 2017-12-06T16:43:00Z | CRITICAL | null | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://github.com/advisories/GHSA-x27v-x225-gq8g', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://github.com/recurly/recurly-client-ruby', 'https://hackerone.com/reports/288635', 'https://dev.recurly.com/page/ruby-updates'} | null |
RubyGems | GHSA-49pj-69vf-c689 | Incorrect Default Permissions in netaddr | The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem. | {'CVE-2019-17383'} | 2022-03-03T05:14:12.069946Z | 2019-10-14T21:43:19Z | CRITICAL | null | {'CWE-276'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17383', 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://rubygems.org/gems/netaddr/versions'} | null |
RubyGems | GHSA-2j9c-9vmv-7m39 | Missing anchor in Rack-Cors allows malicious third party site to perform CORS request | Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed. | {'CVE-2017-11173'} | 2022-04-26T18:33:06.302051Z | 2018-07-31T18:18:39Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2017-11173', 'https://github.com/cyu/rack-cors', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'http://www.debian.org/security/2017/dsa-3931', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html'} | null |
RubyGems | GHSA-rg32-m3hf-772v | Deserialization of Untrusted Data in Slanger | Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3. | {'CVE-2019-1010306'} | 2022-03-03T05:13:31.232916Z | 2019-07-16T00:41:40Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'} | null |
RubyGems | GHSA-pf8f-w267-mq2h | The rack-cors rubygem may allow directory traveral | An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format. | {'CVE-2019-18978'} | 2022-03-03T05:14:17.661216Z | 2019-11-15T20:26:59Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-18978', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html', 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4', 'https://usn.ubuntu.com/4571-1/', 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html'} | null |
RubyGems | GHSA-4p8f-mmfj-r45g | Cross-site scripting in fat_free_crm | Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb. | {'CVE-2018-20975'} | 2022-03-03T05:12:18.531927Z | 2019-08-21T16:15:04Z | MODERATE | null | {'CWE-79'} | {'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975', 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1'} | null |
RubyGems | GHSA-48w2-rm65-62xx | Inconsistent Interpretation of HTTP Requests in puma | ### Impact
Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
### Patches
This vulnerability was patched in Puma 5.5.1 and 4.3.9.
### Workarounds
This vulnerability only affects Puma installations without any proxy in front.
Use a proxy which does not forward LF characters as line endings.
Proxies which do not forward LF characters as line endings:
* Nginx
* Apache (>2.4.25)
* Haproxy
* Caddy
* Traefik
### Possible Breakage
If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error.
### References
* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
| {'CVE-2021-41136'} | 2022-03-03T05:13:42.190337Z | 2021-10-12T17:53:00Z | LOW | null | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://github.com/puma/puma/releases/tag/v5.5.1'} | null |
RubyGems | GHSA-35mm-cc6r-8fjp | Cross-site scripting in actionpack | In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware. | {'CVE-2020-8264'} | 2022-03-03T05:12:21.759781Z | 2021-04-07T20:58:47Z | MODERATE | null | {'CWE-79'} | {'https://hackerone.com/reports/904059', 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'} | null |
RubyGems | GHSA-2hxv-mx8x-mcj9 | Spina vulnerable to a cross-site request forgery (CSRF) vulnerability | Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75. | {'CVE-2015-4619'} | 2022-04-26T18:33:06.216082Z | 2018-08-28T22:34:22Z | HIGH | null | {'CWE-352'} | {'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'https://github.com/denkGroot/Spina', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'http://www.securityfocus.com/bid/75216'} | null |
RubyGems | GHSA-46j2-xjgp-jrfm | Information disclosure issue in Active Resource | There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information. | {'CVE-2020-8151'} | 2022-03-03T05:13:44.971445Z | 2020-05-21T21:09:38Z | HIGH | null | {'CWE-863', 'CWE-200'} | {'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://github.com/rails/activeresource', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4H22DZ522HLDS3JX3NX2CXIOZSR/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8151'} | null |
RubyGems | GHSA-pcm6-g2qp-9gw8 | Cap-Strap gem for Ruby places credentials on the useradd command line | lib/cap-strap/helpers.rb in the cap-strap gem 0.1.5 for Ruby places credentials on the useradd command line, which allows local users to obtain sensitive information by listing the process. | {'CVE-2014-4992'} | 2022-04-26T18:04:05Z | 2018-03-16T01:13:46Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-4992', 'http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/9', 'https://github.com/advisories/GHSA-pcm6-g2qp-9gw8', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'} | null |
RubyGems | GHSA-q27f-v3r6-9v77 | Improper Certificate Validation in EM-HTTP-Request | EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified. | {'CVE-2020-13482'} | 2022-03-03T05:13:20.589949Z | 2021-05-24T18:13:13Z | HIGH | null | {'CWE-295'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z32PUJA6RGBZ3TKSOTGUXZ45662S3MVF/', 'https://github.com/igrigorik/em-http-request/issues/339', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13482', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKYP5TR5NTVVDX5R4HCNNH2OQR7M4X3J/'} | null |
RubyGems | GHSA-wjx2-7hqq-8h7m | rails_admin ruby gem XSS vulnerability | RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms. | {'CVE-2020-36190'} | 2022-03-03T05:12:39.003321Z | 2021-01-14T19:17:16Z | MODERATE | null | {'CWE-79'} | {'https://github.com/sferik/rails_admin/compare/v1.4.2...v1.4.3', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190'} | null |
RubyGems | GHSA-jc8m-cxhj-668x | Improper Restriction of Excessive Authentication Attempts in Sorcery | ### Impact
Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users that do not use the built-in brute force protection submodule, nor users that use permanent account lockout.
### Patches
Patched as of version `0.15.0`.
### Workarounds
Currently no workarounds, other than monkey patching the authenticate method provided by Sorcery or upgrading to version `0.15.0`. | {'CVE-2020-11052'} | 2022-03-03T05:13:08.974248Z | 2020-05-07T21:16:46Z | HIGH | null | {'CWE-307'} | {'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/Sorcery/sorcery/pull/235', 'https://github.com/Sorcery/sorcery/security/advisories/GHSA-jc8m-cxhj-668x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/issues/231'} | null |
RubyGems | GHSA-j838-vfpq-fmf2 | Moderate severity vulnerability that affects actionpack | The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence. | {'CVE-2013-1857'} | 2022-03-03T05:13:11.264538Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://support.apple.com/kb/HT5784', 'https://github.com/advisories/GHSA-j838-vfpq-fmf2', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain', 'https://github.com/rails/rails', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'} | null |
RubyGems | GHSA-9v3m-8fp8-mj99 | Cross-Site Scripting in bootstrap | Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript.
## Recommendation
For `bootstrap` 4.x upgrade to 4.3.1 or later.
For `bootstrap` 3.x upgrade to 3.4.1 or later. | {'CVE-2019-8331'} | 2022-03-03T05:12:54.587316Z | 2019-02-22T20:54:47Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'http://seclists.org/fulldisclosure/2019/May/13', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.securityfocus.com/bid/107375', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://support.f5.com/csp/article/K24383845', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/advisories/GHSA-9v3m-8fp8-mj99', 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/', 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS', 'https://www.npmjs.com/advisories/891', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/pull/28236', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024'} | null |
RubyGems | GHSA-67j6-xv27-w6ww | Moderate severity vulnerability that affects web-console | request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request. | {'CVE-2015-3224'} | 2022-03-03T05:14:10.034633Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-284'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html', 'http://openwall.com/lists/oss-security/2015/06/16/18', 'https://github.com/rails/web-console', 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown', 'http://www.securityfocus.com/bid/75237', 'https://github.com/advisories/GHSA-67j6-xv27-w6ww', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ'} | null |
RubyGems | GHSA-3vfw-7rcp-3xgm | Moderate severity vulnerability that affects actionpack | The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. | {'CVE-2011-3187'} | 2022-03-03T05:12:16.910623Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html', 'https://github.com/advisories/GHSA-3vfw-7rcp-3xgm', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'https://bugzilla.novell.com/show_bug.cgi?id=673010', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html'} | null |
RubyGems | GHSA-8gg6-3r63-25m8 | High severity vulnerability that affects git-fastclone | git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories. | {'CVE-2015-8968'} | 2022-03-03T05:11:06.863059Z | 2018-08-15T20:03:37Z | HIGH | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-8968', 'https://github.com/advisories/GHSA-8gg6-3r63-25m8', 'https://hackerone.com/reports/104465', 'https://github.com/square/git-fastclone', 'http://www.securityfocus.com/bid/81433', 'https://github.com/square/git-fastclone/pull/2'} | null |
RubyGems | GHSA-mqm2-cgpr-p4m6 | Unintended read access in kramdown gem | The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum. | {'CVE-2020-14001'} | 2022-04-29T20:33:22.978732Z | 2020-08-07T22:27:41Z | CRITICAL | null | {'CWE-862'} | {'https://usn.ubuntu.com/4562-1/', 'https://kramdown.gettalong.org/news.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://www.debian.org/security/2020/dsa-4743', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/', 'https://rubygems.org/gems/kramdown', 'https://kramdown.gettalong.org', 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html', 'https://security.netapp.com/advisory/ntap-20200731-0004/', 'https://github.com/gettalong/kramdown', 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0', 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'} | null |
RubyGems | GHSA-4whc-pp4x-9pf3 | Moderate severity vulnerability that affects jquery-rails and jquery-ujs | jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value. | {'CVE-2015-1840'} | 2022-03-03T05:13:19.587035Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-200'} | {'https://github.com/rails/jquery-rails', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html', 'http://www.securityfocus.com/bid/75239', 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J', 'http://openwall.com/lists/oss-security/2015/06/16/15', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840', 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html', 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'} | null |
RubyGems | GHSA-6h88-qjpv-p32m | OpenSSL gem for Ruby using inadequate encryption strength | The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | {'CVE-2016-7798'} | 2022-04-25T16:47:00.898499Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-326'} | {'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798', 'http://www.securityfocus.com/bid/93031', 'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'http://www.openwall.com/lists/oss-security/2016/09/19/9', 'https://github.com/ruby/openssl/issues/49', 'http://www.openwall.com/lists/oss-security/2016/10/01/2', 'https://www.debian.org/security/2017/dsa-3966', 'https://github.com/ruby/openssl'} | null |
RubyGems | GHSA-w749-p3v6-hccq | Possible code injection vulnerability in Rails / Active Storage | The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally, a strict ImageMagick security policy will help mitigate this issue. | {'CVE-2022-21831'} | 2022-03-11T20:46:53.775228Z | 2022-03-08T21:25:54Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://github.com/rails/rails', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI', 'https://rubysec.com/advisories/CVE-2022-21831/'} | null |
RubyGems | GHSA-gr44-7grc-37vq | Moderate severity vulnerability that affects activerecord | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection mechanism and modify protected model attributes via a crafted request. | {'CVE-2013-0276'} | 2022-03-03T05:14:10.481730Z | 2017-10-24T18:33:37Z | MODERATE | null | null | {'http://www.osvdb.org/90072', 'http://secunia.com/advisories/52774', 'http://support.apple.com/kb/HT5784', 'http://www.openwall.com/lists/oss-security/2013/02/11/5', 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.debian.org/security/2013/dsa-2620', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://www.securityfocus.com/bid/57896', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://secunia.com/advisories/52112', 'https://github.com/advisories/GHSA-gr44-7grc-37vq'} | null |
RubyGems | GHSA-h6rj-8r3c-9gpj | bson is vulnerable to denial of service due to incorrect regex validation | BSON injection vulnerability in the legal function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string. | {'CVE-2015-4412'} | 2022-04-25T22:45:10.830Z | 2018-03-05T19:43:21Z | CRITICAL | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1229750', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://github.com/mongodb/bson-ruby', 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'http://www.securityfocus.com/bid/75045'} | null |
RubyGems | GHSA-8xfw-5q82-3652 | Authentication Bypass by CSRF Weakness | ### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.1 users should update to spree_auth_devise 4.1.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null | 2021-11-18T19:51:58Z | 2021-11-18T20:15:23Z | CRITICAL | null | {'CWE-352'} | {'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'} | null |
RubyGems | GHSA-h8hx-2c5r-32cf | Cross-Site Request Forgery (CSRF) in trestle-auth | ### Impact
A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
### Patches
The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues)
* Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com) | {'CVE-2021-29435'} | 2022-03-03T05:14:00.718340Z | 2021-04-13T17:01:50Z | HIGH | null | {'CWE-352'} | {'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://rubygems.org/gems/trestle-auth'} | null |
RubyGems | GHSA-86g5-2wh3-gc9j | Critical severity vulnerability that affects actionview | # File Content Disclosure in Action View
Impact
------
There is a possible file content disclosure vulnerability in Action View.
Specially crafted accept headers in combination with calls to `render file:`
can cause arbitrary files on the target server to be rendered, disclosing the
file contents.
The impact is limited to calls to `render` which render file contents without
a specified accept format. Impacted code in a controller looks something like
this:
```
class UserController < ApplicationController
def index
render file: "#{Rails.root}/some/file"
end
end
```
Rendering templates as opposed to files is not impacted by this vulnerability.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are
available at the normal locations.
Workarounds
-----------
This vulnerability can be mitigated by specifying a format for file rendering,
like this:
```
class UserController < ApplicationController
def index
render file: "#{Rails.root}/some/file", formats: [:html]
end
end
```
In summary, impacted calls to `render` look like this:
```
render file: "#{Rails.root}/some/file"
```
The vulnerability can be mitigated by changing to this:
```
render file: "#{Rails.root}/some/file", formats: [:html]
```
Other calls to `render` are not impacted.
Alternatively, the following monkey patch can be applied in an initializer:
```
$ cat config/initializers/formats_filter.rb
# frozen_string_literal: true
ActionDispatch::Request.prepend(Module.new do
def formats
super().select do |format|
format.symbol || format.ref == "*/*"
end
end
end)
```
Credits
-------
Thanks to John Hawthorn <john@hawthorn.email> of GitHub | {'CVE-2019-5418'} | 2022-03-03T05:14:04.755881Z | 2019-03-13T17:26:59Z | HIGH | null | {'CWE-22'} | {'http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5418', 'https://github.com/advisories/GHSA-86g5-2wh3-gc9j', 'https://access.redhat.com/errata/RHSA-2019:1289', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://access.redhat.com/errata/RHSA-2019:1149', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'https://access.redhat.com/errata/RHSA-2019:0796', 'https://www.exploit-db.com/exploits/46585/', 'https://groups.google.com/forum/#!topic/rubyonrails-security/zRNVOUhKHrg', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'} | null |
RubyGems | GHSA-w542-cpp9-r3g7 | CSRF in Field Test | The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2.
## Impact
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected.
A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user.
All users running an affected release should upgrade immediately.
## Technical Details
Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`. | {'CVE-2020-16252'} | 2022-03-03T05:14:05.267374Z | 2020-08-05T14:53:34Z | MODERATE | null | {'CWE-352'} | {'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0', 'https://rubygems.org/gems/field_test', 'https://github.com/ankane/field_test/issues/28', 'https://github.com/ankane/field_test', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252'} | null |
RubyGems | GHSA-4vf4-qmvg-mh7h | Cookie prefix spoofing in CGI | CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby. | {'CVE-2021-41819'} | 2022-03-03T05:13:28.201777Z | 2022-01-21T23:22:17Z | HIGH | null | {'CWE-565'} | {'https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/', 'https://hackerone.com/reports/910552', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819', 'https://security.netapp.com/advisory/ntap-20220121-0003/'} | null |
RubyGems | GHSA-fj7f-vq84-fh43 | Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile. | In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false.
To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the
commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables.
Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.
### Exploitation
To exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL
will be used to construct a Git clone command but will be interpreted as the [upload-pack](https://git-scm.com/docs/git-clone#Documentation/git-clone.txt--ultupload-packgt) argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.
### Impact
This vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, as explained above, the exploitability is very low, because it requires a lot of user interaction. It still could put developers at risk when dealing with untrusted files in a way they think is safe, because the exploit still works when the victim tries to make sure nothing can happen, e.g. by manually reviewing the `Gemfile` (although they would need the weird URL with a leading dash to not raise any flags).
This kind of attack vector [has been used in the past](https://www.cnbc.com/2021/01/26/north-korean-hackers-targeting-security-researchers-on-twitter.html) to target security researchers by sending them projects to collaborate on.
### Patches
Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue.
### Workarounds
Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`'s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.
### References
https://cwe.mitre.org/data/definitions/88.html | {'CVE-2021-43809'} | 2022-03-03T05:13:05.052325Z | 2021-12-08T19:51:36Z | MODERATE | null | {'CWE-88'} | {'https://github.com/rubygems/rubygems', 'https://github.com/rubygems/rubygems/pull/5142', 'https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809'} | null |
RubyGems | GHSA-hwhf-64mh-r662 | ReDoS vulnerability in parser_apache2 | ### Impact
parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack.
### Patches
v1.14.2
### Workarounds
Either of the following:
* Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache.
* Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
### References
* [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186)
* [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662)
* [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/)
* https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
| {'CVE-2021-41186'} | 2022-03-03T05:13:55.219469Z | 2021-11-01T19:16:31Z | MODERATE | null | {'CWE-400'} | {'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142', 'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662', 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md', 'https://github.com/fluent/fluentd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186'} | null |
RubyGems | GHSA-6x85-j5j2-27jx | Moderate severity vulnerability that affects actionpack | Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request. | {'CVE-2014-0130'} | 2022-03-03T05:13:31.344632Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-22'} | {'http://www.securityfocus.com/bid/67244', 'http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130', 'https://github.com/advisories/GHSA-6x85-j5j2-27jx'} | null |
RubyGems | GHSA-wpw7-wxjm-cw8r | Moderate severity vulnerability that affects actionpack | actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155. | {'CVE-2013-6417'} | 2022-03-03T05:12:53.208388Z | 2017-10-24T18:33:36Z | MODERATE | null | null | {'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417', 'https://puppet.com/security/cve/cve-2013-6417', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://github.com/advisories/GHSA-wpw7-wxjm-cw8r', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-0469.html', 'http://www.debian.org/security/2014/dsa-2888', 'https://github.com/rails/rails'} | null |
RubyGems | GHSA-6wpv-cj6x-v3jw | Moderate severity vulnerability that affects http | The Ruby http gem before 0.7.3 does not verify hostnames in SSL connections, which might allow remote attackers to obtain sensitive information via a man-in-the-middle-attack. | {'CVE-2015-1828'} | 2022-03-03T05:14:09.021079Z | 2018-03-13T16:15:57Z | MODERATE | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-6wpv-cj6x-v3jw', 'https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1828', 'https://github.com/ruby/openssl/issues/8', 'https://rubysec.com/advisories/http-CVE-2015-1828'} | null |
RubyGems | GHSA-p4c6-77gc-694x | Moderate severity vulnerability that affects rails | The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380. | {'CVE-2007-6077'} | 2022-03-03T05:13:15.697188Z | 2017-10-24T18:33:38Z | MODERATE | null | {'CWE-362'} | {'http://dev.rubyonrails.org/changeset/8177', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'http://dev.rubyonrails.org/ticket/10048', 'http://secunia.com/advisories/27781', 'http://www.vupen.com/english/advisories/2007/4009', 'https://github.com/advisories/GHSA-p4c6-77gc-694x', 'http://docs.info.apple.com/article.html?artnum=307179', 'http://www.securityfocus.com/bid/26598', 'http://secunia.com/advisories/28136', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077', 'http://www.vupen.com/english/advisories/2007/4238'} | null |
RubyGems | GHSA-3pxh-h8hw-mj8w | Moderate severity vulnerability that affects rack | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. | {'CVE-2013-0183'} | 2022-03-03T05:12:52.510484Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-119'} | {'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'http://rack.github.com/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack', 'https://bugzilla.redhat.com/show_bug.cgi?id=895282', 'http://www.debian.org/security/2013/dsa-2783', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'} | null |
RubyGems | GHSA-m42h-mh85-4qgc | Moderate severity vulnerability that affects railties | # Possible Remote Code Execution Exploit in Rails Development Mode
Impact
------
With some knowledge of a target application it is possible for an attacker to
guess the automatically generated development mode secret token. This secret
token can be used in combination with other Rails internals to escalate to a
remote code execution exploit.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations.
Workarounds
-----------
This issue can be mitigated by specifying a secret key in development mode.
In "config/environments/development.rb" add this:
```
config.secret_key_base = SecureRandom.hex(64)
```
Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported
at present. Users of earlier unsupported releases are advised to upgrade as
soon as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks to ooooooo_q
| {'CVE-2019-5420'} | 2022-03-03T05:13:42.419962Z | 2019-03-13T17:28:35Z | CRITICAL | null | {'CWE-330', 'CWE-77'} | {'http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-m42h-mh85-4qgc', 'https://www.exploit-db.com/exploits/46785/', 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5420', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'} | null |
RubyGems | GHSA-vqcq-mrmw-mcmg | Rubyzip gem contains a Directory Traversal vulnerability in zip file component | rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete. | {'CVE-2018-1000544'} | 2022-04-26T18:48:01.089130Z | 2018-09-06T03:27:18Z | CRITICAL | null | {'CWE-59', 'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544', 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html', 'https://github.com/advisories/GHSA-vqcq-mrmw-mcmg', 'https://github.com/rubyzip/rubyzip', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html', 'https://access.redhat.com/errata/RHSA-2018:3466', 'https://github.com/rubyzip/rubyzip/issues/369'} | null |
RubyGems | GHSA-q759-hwvc-m3jg | Moderate severity vulnerability that affects actionpack | The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. | {'CVE-2013-1855'} | 2022-03-03T05:14:06.929685Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html', 'http://support.apple.com/kb/HT5784', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'https://github.com/advisories/GHSA-q759-hwvc-m3jg', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain', 'http://rhn.redhat.com/errata/RHSA-2013-0698.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'} | null |
RubyGems | GHSA-cm9w-c4rj-r2cf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component | This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display.
Versions 2.29.1 and 2.49.1 have been released and fully mitigate the vulnerability.
Avoid passing user input to the `translate` function, or sanitize the inputs before passing them.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [github/view_component](http://github.com/github/view_component) project
| {'CVE-2022-24722'} | 2022-03-11T20:16:47.644105Z | 2022-03-02T22:24:05Z | HIGH | null | {'CWE-79'} | {'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_component/releases/tag/v2.31.2', 'https://github.com/github/view_component/', 'https://github.com/github/view_component/releases/tag/v2.49.1'} | null |
RubyGems | GHSA-78rc-8c29-p45g | High severity vulnerability that affects actionpack | Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | {'CVE-2016-2098'} | 2022-03-03T05:14:08.754441Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-20'} | {'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://www.securitytracker.com/id/1035122', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://www.securityfocus.com/bid/83725', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098', 'https://www.exploit-db.com/exploits/40086/', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html', 'http://www.debian.org/security/2016/dsa-3509', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'https://github.com/advisories/GHSA-78rc-8c29-p45g', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'} | null |
RubyGems | GHSA-p673-hjf2-pwfr | High severity vulnerability that affects command_wrap | command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename. | {'CVE-2013-1875'} | 2022-03-03T05:13:00.466412Z | 2017-10-24T18:33:37Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-1875', 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html', 'http://seclists.org/fulldisclosure/2013/Mar/175', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://www.osvdb.org/91450', 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'} | null |
RubyGems | GHSA-5cqm-crxm-6qpv | Buffer overrun vulnerability in CGI | A security vulnerability that causes buffer overflow when you pass a very large string (> 700 MB) to CGI.escape_html on a platform where long type takes 4 bytes, typically, Windows. Please update the cgi gem to version 0.3.1, 0.2,1, and 0.1,1 or later. You can use gem update cgi to update it. If you are using bundler, please add gem "cgi", ">= 0.3.1" to your Gemfile. Alternatively, please update Ruby to 2.7.5 or 3.0.3. This issue has been introduced since Ruby 2.7, so the cgi version bundled with Ruby 2.6 is not vulnerable. | {'CVE-2021-41816'} | 2022-05-02T15:06:43.287487Z | 2021-12-14T21:36:20Z | CRITICAL | null | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41816', 'https://hackerone.com/reports/1328463', 'https://github.com/ruby/cgi', 'https://security-tracker.debian.org/tracker/CVE-2021-41816', 'https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/', 'https://security.netapp.com/advisory/ntap-20220303-0006/', 'https://groups.google.com/g/ruby-security-ann/c/4MQ568ZG47c'} | null |
RubyGems | GHSA-7359-3c6r-hfc2 | Improper Certificate Validation in oauth ruby gem | lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. | {'CVE-2016-11086'} | 2022-03-03T05:14:19.515545Z | 2021-04-22T16:22:15Z | HIGH | null | {'CWE-295'} | {'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby', 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'} | null |
RubyGems | GHSA-2p5p-m353-833w | Sort order SQL injection in Administrate | In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard,
the direction parameter was not validated before being interpolated into the SQL query.
This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections.
Whilst this does have a high-impact, to exploit this you need access to the Administrate dashboards, which we would expect to be behind authentication.
This is patched in wersion 0.13.0. | {'CVE-2020-5257'} | 2022-03-03T05:13:51.867939Z | 2020-03-13T21:05:44Z | HIGH | null | {'CWE-943'} | {'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'} | null |
RubyGems | GHSA-gqvf-892r-vjm5 | Improper Certificate Validation in Puppet | Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. | {'CVE-2020-7942'} | 2022-03-03T05:13:24.756263Z | 2021-04-13T15:42:19Z | MODERATE | null | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7942', 'https://puppet.com/security/cve/CVE-2020-7942/'} | null |
RubyGems | GHSA-g8ww-46x2-2p65 | Denial of Service in Action Dispatch | Impact
------
There is a possible Denial of Service vulnerability in Action Dispatch.
Carefully crafted Accept headers can cause the mime type parser in Action
Dispatch to do catastrophic backtracking in the regular expression engine.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around
the issue.
```ruby
module Mime
class Type
MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series
* 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks to Security Curious <security...@pm.me> for reporting this! | {'CVE-2021-22902'} | 2022-03-03T05:12:44.665390Z | 2021-05-05T19:48:21Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22902', 'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866', 'https://groups.google.com/g/rubyonrails-security/c/_5ID_ld9u1c', 'https://hackerone.com/reports/1138654', 'https://github.com/rails/rails/releases/tag/v6.0.3.7'} | null |
RubyGems | GHSA-f93j-hmcr-jcwh | Data Injection Vulnerability in moped Rubygem | The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string. | {'CVE-2015-4410'} | 2022-03-03T05:13:23.301091Z | 2020-08-19T16:45:49Z | HIGH | null | {'CWE-20'} | {'https://homakov.blogspot.ru/2012/05/saferweb-injects-in-various-ruby.html', 'http://www.openwall.com/lists/oss-security/2015/06/06/3', 'https://rubygems.org/gems/moped/versions', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161964.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://www.securityfocus.com/bid/75045', 'https://seclists.org/oss-sec/2015/q2/653', 'https://bugzilla.redhat.com/show_bug.cgi?id=1229757', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'https://github.com/mongoid/moped/', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987.html', 'http://www.securityfocus.com/bid/75045'} | null |
RubyGems | GHSA-7fqj-cg79-f2pv | High severity vulnerability that affects thumbshooter | lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | {'CVE-2013-1898'} | 2022-03-03T05:13:44.429367Z | 2017-10-24T18:33:37Z | HIGH | null | {'CWE-94'} | {'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html', 'http://osvdb.org/91839', 'http://www.openwall.com/lists/oss-security/2013/03/26/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898', 'http://www.openwall.com/lists/oss-security/2013/03/26/3', 'http://seclists.org/fulldisclosure/2013/Mar/218', 'https://github.com/advisories/GHSA-7fqj-cg79-f2pv'} | null |
RubyGems | GHSA-r9c2-cr39-c8g6 | Moderate severity vulnerability that affects rails-html-sanitizer | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class. | {'CVE-2015-7579'} | 2022-03-03T05:14:07.427612Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-79'} | {'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ', 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f', 'https://github.com/advisories/GHSA-r9c2-cr39-c8g6', 'http://www.openwall.com/lists/oss-security/2016/01/25/12', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://github.com/rails/rails-html-sanitizer', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'} | null |
RubyGems | GHSA-jg4m-q6w8-vrjp | High severity vulnerability that affects rgpg | The self.run_gpg function in lib/rgpg/gpg_helper.rb in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | {'CVE-2013-4203'} | 2022-03-03T05:14:16.169786Z | 2017-10-24T18:33:37Z | HIGH | null | {'CWE-94'} | {'https://github.com/rcook/rgpg', 'http://www.openwall.com/lists/oss-security/2013/08/03/2', 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505', 'https://github.com/advisories/GHSA-jg4m-q6w8-vrjp', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'} | null |
RubyGems | GHSA-73rf-6mrf-759q | Moderate severity vulnerability that affects devise | Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to `increment_failed_attempts` within the `Devise::Models::Lockable` class not being concurrency safe. | {'CVE-2019-5421'} | 2022-03-03T05:13:04.249599Z | 2019-03-19T18:03:25Z | MODERATE | null | {'CWE-367'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-5421', 'https://github.com/plataformatec/devise/pull/4996', 'https://github.com/plataformatec/devise/issues/4981', 'https://github.com/advisories/GHSA-73rf-6mrf-759q'} | null |
RubyGems | GHSA-f2c9-5jqw-3xh3 | Cross-Site Scripting in Qiita::Markdown | Increments Qiita::Markdown before 0.33.0 allows XSS in transformers. | {'CVE-2021-28796'} | 2022-03-03T05:12:48.680737Z | 2021-08-02T17:23:39Z | MODERATE | null | {'CWE-79'} | {'https://vuln.ryotak.me/advisories/15', 'https://github.com/increments/qiita-markdown/compare/v0.32.0...v0.33.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28796'} | null |
RubyGems | GHSA-wmjf-jpjj-9f3j | Low severity vulnerability that affects rubocop | RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users. | {'CVE-2017-8418'} | 2022-03-03T05:12:59.168178Z | 2017-11-15T20:39:47Z | LOW | null | {'CWE-668'} | {'https://github.com/bbatsov/rubocop', 'http://www.openwall.com/lists/oss-security/2017/05/01/14', 'https://github.com/advisories/GHSA-wmjf-jpjj-9f3j', 'https://github.com/bbatsov/rubocop/issues/4336', 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'} | null |
RubyGems | GHSA-69p6-wvmq-27gg | Command injection in ruby-git | The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | {'CVE-2022-25648'} | 2022-04-28T21:15:34.260781Z | 2022-04-20T00:00:33Z | CRITICAL | null | {'CWE-88'} | {'https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0', 'https://github.com/ruby-git/ruby-git/pull/569', 'https://github.com/ruby-git/ruby-git', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648', 'https://snyk.io/vuln/SNYK-RUBY-GIT-2421270'} | null |
RubyGems | GHSA-694m-jhr9-pf77 | High severity vulnerability that affects doorkeeper | Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry. | {'CVE-2018-1000211'} | 2022-03-03T05:13:32.815197Z | 2018-08-13T20:46:41Z | HIGH | null | {'CWE-732'} | {'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/doorkeeper-gem/doorkeeper/pull/1119', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000211', 'https://github.com/doorkeeper-gem/doorkeeper/issues/891', 'https://github.com/advisories/GHSA-694m-jhr9-pf77'} | null |
RubyGems | GHSA-h5g2-38x9-4gv3 | High severity vulnerability that affects archive-tar-minitar and minitar | Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry. | {'CVE-2016-10173'} | 2022-03-03T05:13:07.674662Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-22'} | {'http://www.openwall.com/lists/oss-security/2017/01/24/7', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'http://www.openwall.com/lists/oss-security/2017/01/29/1', 'https://github.com/halostatue/minitar/issues/16', 'https://puppet.com/security/cve/cve-2016-10173', 'https://github.com/halostatue/minitar', 'http://www.debian.org/security/2017/dsa-3778', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173', 'https://security.gentoo.org/glsa/201702-32', 'http://www.securityfocus.com/bid/95874'} | null |
RubyGems | GHSA-v222-6mr4-qj29 | Command Injection vulnerability in asciidoctor-include-ext | ### Impact
Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. ~~This attack is possible even when `allow-uri-read` is disabled!~~ (EDIT: it’s not)
### Patches
The vulnerability has been fixed in commit c7ea001 (and further improved in cbaccf3), which is included in version [0.4.0](https://rubygems.org/gems/asciidoctor-include-ext/versions/0.4.0).
### Workarounds
```rb
require 'asciidoctor/include_ext'
class Asciidoctor::IncludeExt::IncludeProcessor
# Overrides superclass private method to mitigate Command Injection
# vulnerability in asciidoctor-include-ext <0.4.0.
def target_uri?(target)
target.downcase.start_with?('http://', 'https://') \
&& URI.parse(target).is_a?(URI::HTTP)
rescue URI::InvalidURIError
false
end
end
```
### References
* https://sakurity.com/blog/2015/02/28/openuri.html
### Credits
This vulnerability was discovered by Joern Schneeweisz from the GitLab Security Research Team.
### For more information
See commit message c7ea001.
If you have any questions or comments about this advisory open an issue in [jirutka/asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext/issues/). | {'CVE-2022-24803'} | 2022-04-18T22:32:08.086487Z | 2022-03-31T23:27:15Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://github.com/jirutka/asciidoctor-include-ext'} | null |
RubyGems | GHSA-vvff-6wrr-4g7q | Missing Authentication for Critical Function in Foreman Ansible | An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-3589'} | 2022-04-05T19:31:57.898132Z | 2022-03-24T00:00:17Z | CRITICAL | null | {'CWE-306'} | {'https://access.redhat.com/security/cve/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://github.com/theforeman/foreman_ansible', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265'} | null |
RubyGems | GHSA-85rf-xh54-whp3 | Malicious URL drafting attack against iodines static file server may allow path traversal | ### Impact
A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version.
Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder.
### Patches
The vulnerability was patched in version 0.7.34. Please upgrade to the latest version.
### Workarounds
A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically).
However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes.
### For more information
If you have any questions or comments about this advisory:
* Email [Boaz Segev](https://github.com/boazsegev) | null | 2022-03-03T05:13:29.632570Z | 2019-10-07T16:52:13Z | LOW | null | {'CWE-22'} | {'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/boazsegev/iodine'} | null |
RubyGems | GHSA-g45g-g52h-39rg | Cross-site Scripting in Chartkick | The Chartkick gem through 3.1.0 for Ruby allows XSS. | {'CVE-2019-12732'} | 2022-03-03T05:14:01.003551Z | 2019-06-07T20:56:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/ankane/chartkick/issues/488', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732', 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'} | null |
RubyGems | GHSA-8hc4-xxm3-5ppp | Regular Expression Denial-of-Service | The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input. | {'CVE-2021-22880'} | 2022-03-03T05:10:58.783773Z | 2021-03-02T03:44:14Z | HIGH | null | {'CWE-400'} | {'https://rubygems.org/gems/activerecord', 'https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO5OJ3F4ZL3UXVLJO6ECANRVZBNRS2IH/', 'https://hackerone.com/reports/1023899', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22880', 'https://www.debian.org/security/2021/dsa-4929'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.