ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
RubyGems
|
GHSA-c5qq-g673-5p49
|
Low severity vulnerability that affects puppet
|
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
|
{'CVE-2012-1989'}
|
2022-03-03T05:13:46.805744Z
|
2017-10-24T18:33:38Z
|
LOW
| null | null |
{'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797', 'http://secunia.com/advisories/49136', 'http://ubuntu.com/usn/usn-1419-1', 'https://github.com/advisories/GHSA-c5qq-g673-5p49', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989', 'http://secunia.com/advisories/48743', 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html', 'http://secunia.com/advisories/48748', 'https://hermes.opensuse.org/messages/15087408', 'http://www.securityfocus.com/bid/52975', 'http://puppetlabs.com/security/cve/cve-2012-1989/', 'http://projects.puppetlabs.com/issues/13606'}
| null |
RubyGems
|
GHSA-9pr6-grf4-x2fr
|
Omniauth allows POST parameters to be stored in session
|
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
|
{'CVE-2017-18076'}
|
2022-04-25T22:31:54.505893Z
|
2018-01-29T15:45:28Z
|
HIGH
| null | null |
{'https://github.com/advisories/GHSA-9pr6-grf4-x2fr', 'https://github.com/omniauth/omniauth/pull/867', 'https://bugs.debian.org/888523', 'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b', 'https://www.debian.org/security/2018/dsa-4109', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076', 'https://github.com/omniauth/omniauth'}
| null |
RubyGems
|
GHSA-qpg4-4w7w-2mq5
|
Authentication and extension bypass in Faye
|
On 20 April 2020 it was reported to me that the potential for authentication
bypass exists in [Faye][1]'s extension system. This vulnerability has existed in
the Node.js and Ruby versions of the server since version 0.5.0, when extensions
were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and
1.2.5, which we are releasing today.
The vulnerability allows any client to bypass checks put in place by server-side
extensions, by appending extra segments to the message channel. For example, the
Faye [extension docs][2] suggest that users implement access control for
subscriptions by checking incoming messages for the `/meta/subscribe` channel,
for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel === '/meta/subscribe') {
if (message.ext.authToken !== 'my super secret password') {
message.error = 'Invalid auth token';
}
}
callback(message);
}
});
```
A bug in the server's code for recognising the special `/meta/*` channels, which
trigger connection and subscription events, means that a client can bypass this
check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`:
```json
{
"channel": "/meta/subscribe/x",
"clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3",
"subscription": "/foo"
}
```
This message will not be checked by the above extension, as it checks the
message's channel is exactly equal to `/meta/subscribe`. But it will still be
processed as a subscription request by the server, so the client becomes
subscribed to the channel `/foo` without supplying the necessary credentials.
The vulnerability is caused by the way the Faye server recognises meta channels.
It will treat a message to any channel that's a prefix-match for one of the
special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`,
`/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for
that channel. So, a message to `/meta/subscribe/x` is still processed as a
subscription request, for example.
An authentication bypass for subscription requests is the most serious effect of
this but all other meta channels are susceptible to similar manipulation.
This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5.
These should be drop-in replacements for prior versions and you should upgrade
immediately if you are running any prior version.
If you are unable to install one of these versions, you can make your extensions
catch all messages the server would process by checking the channel _begins_
with the expected channel name, for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel.startsWith('/meta/subscribe')) {
// authentication logic
}
callback(message);
}
});
```
[1]: https://faye.jcoglan.com/
[2]: https://faye.jcoglan.com/node/extensions.html
|
{'CVE-2020-11020'}
|
2022-03-03T05:13:00.204591Z
|
2020-04-29T17:41:15Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020'}
| null |
RubyGems
|
GHSA-mg5p-95m9-rmfp
|
Arbitrary file write in actionpack-page_caching gem
|
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
|
{'CVE-2020-8159'}
|
2022-04-07T15:17:02.937159Z
|
2020-05-13T16:28:46Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
| null |
RubyGems
|
GHSA-pc3m-v286-2jwj
|
Moderate severity vulnerability that affects actionview
|
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
|
{'CVE-2016-6316'}
|
2022-03-03T05:13:12.953674Z
|
2017-10-24T18:33:35Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/92430', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'http://www.debian.org/security/2016/dsa-3651', 'http://www.openwall.com/lists/oss-security/2016/08/11/3', 'https://github.com/advisories/GHSA-pc3m-v286-2jwj', 'https://puppet.com/security/cve/cve-2016-6316', 'http://rhn.redhat.com/errata/RHSA-2016-1857.html', 'http://rhn.redhat.com/errata/RHSA-2016-1858.html', 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE', 'http://rhn.redhat.com/errata/RHSA-2016-1856.html', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}
| null |
RubyGems
|
GHSA-jxhw-mg8m-2pj8
|
Moderate severity vulnerability that affects devise
|
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
|
{'CVE-2013-0233'}
|
2022-03-03T05:12:37.324141Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null | null |
{'http://www.openwall.com/lists/oss-security/2013/01/29/3', 'http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html', 'https://github.com/advisories/GHSA-jxhw-mg8m-2pj8', 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/', 'https://github.com/Snorby/snorby/issues/261', 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset', 'https://github.com/Snorby/snorby', 'http://www.securityfocus.com/bid/57577', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html'}
| null |
RubyGems
|
GHSA-xrr6-3pc4-m447
|
Moderate severity vulnerability that affects activerecord
|
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
|
{'CVE-2015-7577'}
|
2022-03-03T05:12:59.043829Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-284'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/10', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577', 'https://github.com/advisories/GHSA-xrr6-3pc4-m447', 'http://www.securitytracker.com/id/1034816', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securityfocus.com/bid/81806', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
| null |
RubyGems
|
GHSA-6jvm-3j5h-79f6
|
Moderate severity vulnerability that affects paperclip
|
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
|
{'CVE-2015-2963'}
|
2022-03-03T05:13:20.403613Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088', 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57', 'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://robots.thoughtbot.com/paperclip-security-release', 'https://github.com/thoughtbot/paperclip', 'http://www.securityfocus.com/bid/75304', 'http://openwall.com/lists/oss-security/2015/06/19/3', 'https://github.com/advisories/GHSA-6jvm-3j5h-79f6'}
| null |
RubyGems
|
GHSA-f8cm-364f-q9qh
|
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
|
### Impact
The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints.
### Patches
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version.
### Workarounds
In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents:
```ruby
module Spree
module Api
module V2
module BaseControllerDecorator
private
def spree_current_user
return nil unless doorkeeper_token
return @spree_current_user if @spree_current_user
doorkeeper_authorize!
@spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id)
end
end
end
end
Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator)
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
|
{'CVE-2020-15269'}
|
2022-03-03T05:14:18.631312Z
|
2020-10-20T20:03:52Z
|
HIGH
| null |
{'CWE-613', 'CWE-287'}
|
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269', 'https://github.com/spree/spree'}
| null |
RubyGems
|
GHSA-xf96-32q2-9rw2
|
High severity vulnerability that affects rails
|
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
|
{'CVE-2008-4094'}
|
2022-03-03T05:11:30.116458Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-89'}
|
{'http://secunia.com/advisories/31875', 'http://rails.lighthouseapp.com/projects/8994/tickets/288', 'http://secunia.com/advisories/31910', 'http://www.openwall.com/lists/oss-security/2008/09/13/2', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109', 'http://www.securityfocus.com/bid/31176', 'http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1', 'http://www.vupen.com/english/advisories/2008/2562', 'https://github.com/advisories/GHSA-xf96-32q2-9rw2', 'http://rails.lighthouseapp.com/projects/8994/tickets/964', 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094', 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/', 'http://secunia.com/advisories/31909', 'http://www.securitytracker.com/id?1020871', 'https://github.com/rails/rails', 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://www.openwall.com/lists/oss-security/2008/09/16/1', 'http://gist.github.com/8946'}
| null |
RubyGems
|
GHSA-6mqr-q86q-6gwr
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null |
2021-11-18T19:52:03Z
|
2021-11-18T20:15:09Z
|
CRITICAL
| null |
{'CWE-352'}
|
{'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
| null |
RubyGems
|
GHSA-59c7-4xj2-hgvw
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
|
{'CVE-2015-7578'}
|
2022-03-03T05:12:07.032028Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://github.com/rails/rails-html-sanitizer/', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}
| null |
RubyGems
|
GHSA-ggxm-pgc9-g7fp
|
Arbitrary Code Execution in rdoc
|
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
|
{'CVE-2021-31799'}
|
2022-04-22T15:47:43.374950Z
|
2021-09-01T18:53:15Z
|
HIGH
| null |
{'CWE-74', 'CWE-77'}
|
{'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://github.com/ruby/rdoc', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'}
| null |
RubyGems
|
GHSA-qf9q-q4hh-qph3
|
SQL injection in blazer
|
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
|
{'CVE-2022-29498'}
|
2022-04-29T21:16:59.900885Z
|
2022-04-22T00:00:36Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29498', 'https://github.com/ankane/blazer', 'https://github.com/ankane/blazer/issues/392'}
| null |
RubyGems
|
GHSA-mp78-r56v-45qc
|
Moderate severity vulnerability that affects ember-source
|
Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2.
|
{'CVE-2015-1866'}
|
2022-03-03T05:14:17.947267Z
|
2018-08-28T22:34:31Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mp78-r56v-45qc', 'http://www.securityfocus.com/bid/74185', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866', 'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html', 'http://www.openwall.com/lists/oss-security/2015/04/14/11'}
| null |
RubyGems
|
GHSA-gpqc-4pp7-5954
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
Spree 4.1 users should update to spree_auth_devise 4.1.1
Older Spree version users should update to spree_auth_devise 4.0.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
| null |
2022-03-03T05:13:18.626996Z
|
2021-11-18T20:15:35Z
|
CRITICAL
| null |
{'CWE-352'}
|
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954', 'https://github.com/spree/spree_auth_devise', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
| null |
RubyGems
|
GHSA-9hx9-w2j6-rw76
|
Low severity vulnerability that affects show_in_browser
|
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.
|
{'CVE-2013-2105'}
|
2020-06-16T21:28:50Z
|
2017-10-24T18:33:37Z
|
LOW
| null |
{'CWE-59'}
|
{'http://vapid.dhs.org/advisories/show_in_browser.html', 'http://www.openwall.com/lists/oss-security/2013/05/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105', 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}
| null |
RubyGems
|
GHSA-fwcm-636p-68r5
|
Server-side request forgery in CarrierWave
|
### Impact
[CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform.
### Patches
Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2).
### Workarounds
Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access.
### References
[Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave)
* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
|
{'CVE-2021-21288'}
|
2022-03-03T05:13:46.424790Z
|
2021-02-08T19:16:26Z
|
LOW
| null |
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://rubygems.org/gems/carrierwave/'}
| null |
RubyGems
|
GHSA-vm28-mrm7-fpjq
|
High severity vulnerability that affects sfpagent
|
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
|
{'CVE-2014-2888'}
|
2022-03-03T05:13:10.883602Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-77'}
|
{'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html', 'https://github.com/advisories/GHSA-vm28-mrm7-fpjq', 'http://www.openwall.com/lists/oss-security/2014/04/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888', 'http://seclists.org/fulldisclosure/2014/Apr/243', 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}
| null |
RubyGems
|
GHSA-x7rv-cr6v-4vm4
|
Moderate severity vulnerability that affects loofah
|
Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments.
Users are affected if running Loofah < 2.2.1, but only:
* when running on MRI or RBX,
* in combination with libxml2 >= 2.9.2.
Please note: JRuby users are not affected.
|
{'CVE-2018-8048'}
|
2022-03-03T05:14:04.943637Z
|
2018-03-21T11:57:11Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/flavorjones/loofah/issues/144', 'https://github.com/flavorjones/loofah/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048', 'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4', 'https://www.debian.org/security/2018/dsa-4171', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}
| null |
RubyGems
|
GHSA-9p29-94hp-8rvc
|
XSS in qiita-markdown
|
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
|
{'CVE-2021-28833'}
|
2022-03-03T05:13:17.293242Z
|
2021-08-02T17:22:07Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://vuln.ryotak.me/advisories/50', 'https://github.com/increments/qiita-markdown/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28833'}
| null |
RubyGems
|
GHSA-mj4x-wcxf-hm8x
|
Json-jwt (RubyGems) did not verify, or incorrectly verifies, the cryptographic signature for data
|
The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
|
{'CVE-2018-1000539'}
|
2022-04-26T18:33:05.770261Z
|
2018-07-31T18:13:51Z
|
MODERATE
| null |
{'CWE-347'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539', 'https://github.com/nov/json-jwt/pull/62', 'https://github.com/nov/json-jwt', 'https://github.com/advisories/GHSA-mj4x-wcxf-hm8x', 'https://www.debian.org/security/2018/dsa-4283'}
| null |
RubyGems
|
GHSA-98mf-8f57-64qf
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
|
{'CVE-2012-3463'}
|
2022-03-03T05:14:10.133908Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://github.com/advisories/GHSA-98mf-8f57-64qf', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}
| null |
RubyGems
|
GHSA-x3rq-r3cm-5vc4
|
Business Logic Errors in Publify
|
Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors.
|
{'CVE-2022-0524'}
|
2022-03-03T05:12:56.204589Z
|
2022-02-09T00:00:27Z
|
HIGH
| null | null |
{'https://github.com/publify/publify/releases/tag/v9.2.7', 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5', 'https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d', 'https://github.com/publify/publify/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}
| null |
RubyGems
|
GHSA-w248-xr37-jx8m
|
High severity vulnerability that affects fastreader
|
lib/entry_controller.rb in the fastreader Gem 1.0.8 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
{'CVE-2013-2615'}
|
2022-03-03T05:12:53.091428Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-94'}
|
{'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615', 'http://www.osvdb.org/91232', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'https://github.com/advisories/GHSA-w248-xr37-jx8m', 'http://seclists.org/fulldisclosure/2013/Mar/122', 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}
| null |
RubyGems
|
GHSA-mvw8-v767-qhjm
|
Moderate severity vulnerability that affects radiant
|
Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter to an admin/pages/*/edit resource.
|
{'CVE-2018-5216'}
|
2022-03-03T05:13:04.487795Z
|
2018-01-06T01:11:52Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/imsebao/404team', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216', 'https://github.com/imsebao/404team/blob/master/radiantcms.md', 'https://github.com/advisories/GHSA-mvw8-v767-qhjm'}
| null |
RubyGems
|
GHSA-g89m-3wjw-h857
|
Low severity vulnerability that affects puppet
|
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
|
{'CVE-2012-3865'}
|
2022-03-03T05:13:46.452209Z
|
2017-10-24T18:33:37Z
|
LOW
| null |
{'CWE-22'}
|
{'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://github.com/advisories/GHSA-g89m-3wjw-h857', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'http://puppetlabs.com/security/cve/cve-2012-3865/', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=839131', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}
| null |
RubyGems
|
GHSA-f599-5m7p-hcpf
|
Moderate severity vulnerability that affects grape
|
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
|
{'CVE-2018-3769'}
|
2022-03-03T05:13:20.669121Z
|
2018-08-13T20:45:32Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3769', 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af', 'https://github.com/ruby-grape/grape/issues/1762', 'https://github.com/ruby-grape/grape/pull/1763', 'https://github.com/advisories/GHSA-f599-5m7p-hcpf'}
| null |
RubyGems
|
GHSA-vqcm-7f7f-r539
|
brbackup exposes database password to unauthorized users
|
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.
|
{'CVE-2014-5004'}
|
2022-04-25T22:09:39Z
|
2018-03-05T19:32:06Z
|
HIGH
| null |
{'CWE-200'}
|
{'http://www.openwall.com/lists/oss-security/2014/07/10/6', 'http://www.securityfocus.com/bid/68506', 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html', 'https://github.com/advisories/GHSA-vqcm-7f7f-r539', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
| null |
RubyGems
|
GHSA-jm35-h8q2-73mp
|
Improper one time password handling in devise-two-factor
|
### Impact
As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval.
### Patches
This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible.
### Credit for discovery
Benoit Côté-Jodoin
Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106
|
{'CVE-2021-43177'}
|
2022-04-19T18:30:18.696960Z
|
2022-04-07T22:09:03Z
|
MODERATE
| null | null |
{'https://github.com/tinfoil/devise-two-factor', 'https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43177', 'https://github.com/tinfoil/devise-two-factor/issues/106'}
| null |
RubyGems
|
GHSA-4ww3-3rxj-8v6q
|
High severity vulnerability that affects actionpack
|
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
|
{'CVE-2011-0449'}
|
2022-03-03T05:13:32.352787Z
|
2017-10-24T18:33:38Z
|
HIGH
| null | null |
{'http://secunia.com/advisories/43278', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449', 'http://www.vupen.com/english/advisories/2011/0877', 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'https://github.com/advisories/GHSA-4ww3-3rxj-8v6q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://securitytracker.com/id?1025061'}
| null |
RubyGems
|
GHSA-5h5r-ffc4-c455
|
strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
|
The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6.
|
{'CVE-2019-13354'}
|
2021-08-17T17:50:51Z
|
2019-07-08T20:32:35Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://rubygems.org/gems/strong_password/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354', 'https://withatwist.dev/strong-password-rubygem-hijacked.html', 'https://github.com/bdmac/strong_password/releases', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'}
| null |
RubyGems
|
GHSA-xq52-rv6w-397c
|
Directive injection when using dynamic overrides with user input
|
### Impact
If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection.
This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers` are sorted alphabetically so they pretty much all come before `script-src`. A previously undefined directive would receive a value even if `SecureHeaders::OPT_OUT` was supplied.
The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s.
> Duplicate script-src directives detected. All but the first instance will be ignored.
See https://www.w3.org/TR/CSP3/#parse-serialized-policy
> Note: In this case, the user agent SHOULD notify developers that a duplicate directive was ignored. A console warning might be appropriate, for example.
### Patches
Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0.
### Workarounds
If you are passing user input into the above methods, you could filter out the input:
```ruby
override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")])
```
### References
Reported in https://github.com/twitter/secure_headers/issues/418
https://www.w3.org/TR/CSP3/#parse-serialized-policy
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repo](https://github.com/twitter/secure_headers/issues/new)
* DM @ndm on twitter
|
{'CVE-2020-5217'}
|
2022-03-03T05:13:11.160362Z
|
2020-01-23T02:28:11Z
|
MODERATE
| null |
{'CWE-95'}
|
{'https://github.com/twitter/secure_headers/issues/418', 'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5217', 'https://github.com/twitter/secure_headers/pull/421'}
| null |
RubyGems
|
GHSA-24fg-p96v-hxh8
|
Moderate severity vulnerability that affects rails
|
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
|
{'CVE-2011-0447'}
|
2022-03-03T05:13:50.651420Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-352'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://www.vupen.com/english/advisories/2011/0877', 'http://www.debian.org/security/2011/dsa-2247', 'https://github.com/advisories/GHSA-24fg-p96v-hxh8', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447', 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails', 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain', 'http://www.securitytracker.com/id?1025060', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://secunia.com/advisories/43666', 'http://www.securityfocus.com/bid/46291', 'http://www.vupen.com/english/advisories/2011/0587', 'http://secunia.com/advisories/43274'}
| null |
RubyGems
|
GHSA-v3rr-cph9-2g2q
|
Moderate severity vulnerability that affects rack-ssl
|
Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
|
{'CVE-2014-2538'}
|
2022-03-03T05:13:09.421535Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html', 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538', 'http://www.securityfocus.com/bid/66314', 'https://github.com/advisories/GHSA-v3rr-cph9-2g2q', 'https://github.com/josh/rack-ssl', 'http://secunia.com/advisories/57466', 'http://www.openwall.com/lists/oss-security/2014/03/19/20'}
| null |
RubyGems
|
GHSA-2v5c-755p-p4gv
|
Missing TLS certificate verification in faye-websocket
|
The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1]
method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL
is used for the connection. This method does not implement certificate
verification by default, meaning that it does not check that the server presents
a valid and trusted TLS certificate for the expected hostname. That means that
any `wss:` connection made using this library is vulnerable to a
man-in-the-middle attack, since it does not confirm the identity of the server
it is connected to.
This has been a requested feature in EventMachine for many years now; see for
example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6]
published an [advisory][7] related to this problem and fixed it by [implementing
TLS verification][8] in their own codebase; although EventMachine does not
implement certificate verification itself, it provides an extension point for
the caller to implement it, called [`ssl_verify_peer`][9]. Based on this
implementation, we have incorporated similar functionality into [faye-websocket
for Ruby][10], such that we use the `OpenSSL` module to perform two checks:
- The chain of certificates presented by the server is valid and ultimately
trusted by your root certificate set -- either your system default root
certificates, or a set provided at runtime
- The final certificate presented by the server is valid for the hostname used
in the request URI; if the connection is made via a proxy we use the hostname
from the request, not the proxy's hostname
After implementing verification in v1.1.6, em-http-request has elected to leave
the `:verify_peer` option switched off by default. We have decided to _enable_
this option by default in faye-websocket, but are publishing a minor release
with added functionality for configuring it. We are mindful of the fact that
this may break existing programs, but we consider it much more important that
all clients have TLS verification turned on by default. A client that is not
carrying out verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a
self-signed certificate. We consider this use case to be "working by accident",
rather than functionality that was actively supported, and it should be properly
and explicitly supported instead. To that end, we have added two new options to
the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and
`tls.verify_peer`.
The `:root_cert_file` option lets you provide a different set of root
certificates in situations where you don't want to use your system's default
root certificates to verify the remote host. It should be a path or an array of
paths identifying the certificates to use instead of the defaults.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
root_cert_file: 'path/to/certificate.pem'
})
```
The `:verify_peer` option lets you turn verification off entirely. This should
be a last resort and we recommend using the `:root_cert_file` option if
possible.
```rb
client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: {
verify_peer: false
})
```
To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems
package][10]. There are, unfortunately, no workarounds for this issue, as you
cannot enable `:verify_peer` in EventMachine unless the calling library contains
an implementation of `ssl_verify_peer` that actually checks the server's
certificates.
For further background information on this issue, please see [faye#524][12] and
[faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel
Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing
|
{'CVE-2020-15133'}
|
2022-03-03T05:13:15.785376Z
|
2020-07-31T17:40:04Z
|
HIGH
| null |
{'CWE-295'}
|
{'https://github.com/faye/faye/issues/524', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv', 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby'}
| null |
RubyGems
|
GHSA-q58g-455p-8vw9
|
In RubyGem excon, interrupted Persistent Connections May Leak Response Data
|
### Impact
There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
### Patches
The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists).
### Workarounds
Users can workaround the problem by disabling persistent connections, though this may cause performance implications.
### References
See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [excon/issues](https://github.com/excon/excon/issues)
* Email us at [geemus+github@gmail.com](mailto:geemus+github@gmail.com)
|
{'CVE-2019-16779'}
|
2022-03-03T05:12:58.973224Z
|
2019-12-16T19:30:17Z
|
MODERATE
| null |
{'CWE-362', 'CWE-664'}
|
{'https://github.com/excon/excon', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779', 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html', 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}
| null |
RubyGems
|
GHSA-fr52-4hqw-p27f
|
Nokogiri does not forbid namespace nodes in XPointer ranges
|
xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
|
{'CVE-2016-4658'}
|
2022-04-26T18:33:06.257055Z
|
2018-08-21T19:03:26Z
|
CRITICAL
| null |
{'CWE-119'}
|
{'https://support.apple.com/HT207141', 'https://support.apple.com/HT207170', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658', 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b', 'https://support.apple.com/HT207142', 'https://support.apple.com/HT207143', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html', 'https://security.gentoo.org/glsa/201701-37', 'https://github.com/advisories/GHSA-fr52-4hqw-p27f', 'http://www.securitytracker.com/id/1038623', 'http://www.securityfocus.com/bid/93054', 'http://www.securitytracker.com/id/1036858', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html'}
| null |
RubyGems
|
GHSA-685w-vc84-wxcx
|
Moderate severity vulnerability that affects doorkeeper
|
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
|
{'CVE-2014-8144'}
|
2022-03-03T05:13:33.937940Z
|
2018-09-17T21:55:22Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8144', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342', 'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-685w-vc84-wxcx', 'http://seclists.org/oss-sec/2014/q4/1076'}
| null |
RubyGems
|
GHSA-5hq2-xf89-9jxq
|
Open Redirect in Action Pack
|
Impact
------
This is similar to CVE-2021-22881. Specially crafted Host headers in
combination with certain "allowed host" formats can cause the Host
Authorization middleware in Action Pack to redirect users to a malicious
website.
Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading
dot are converted to regular expressions without proper escaping. This causes,
for example, config.hosts << "sub.example.com" to permit a request with a Host
header value of sub-example.com.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch put in an initializer can be used as a workaround.
```ruby
class ActionDispatch::HostAuthorization::Permissions
def sanitize_string(host)
if host.start_with?(".")
/\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i
else
/\A#{Regexp.escape host}\z/i
end
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-1-open-redirect.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
|
{'CVE-2021-22903'}
|
2022-03-03T05:13:40.829122Z
|
2021-05-05T19:48:29Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22903', 'https://hackerone.com/reports/1148025', 'https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867', 'https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0'}
| null |
RubyGems
|
GHSA-hj56-84jw-67h6
|
Potential Denial-of-Service in bindata
|
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
|
{'CVE-2021-32823'}
|
2022-03-03T05:13:23.518004Z
|
2021-06-23T23:42:04Z
|
LOW
| null |
{'CWE-400'}
|
{'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency', 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://rubygems.org/gems/bindata', 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323', 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/rubysec/ruby-advisory-db/issues/476', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32823'}
| null |
RubyGems
|
GHSA-864j-6qpp-cmrr
|
SQL Injection in Geocoder
|
sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data.
|
{'CVE-2020-7981'}
|
2022-03-03T05:14:07.999518Z
|
2020-06-10T20:03:02Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocoder/CVE-2020-7981.yml', 'https://github.com/alexreisner/geocoder', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7981', 'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1', 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7981'}
| null |
RubyGems
|
GHSA-wwh7-4jw9-33x6
|
High severity vulnerability that affects yajl-ruby
|
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
|
{'CVE-2017-16516'}
|
2022-03-03T05:13:38.696890Z
|
2017-11-28T22:44:42Z
|
HIGH
| null |
{'CWE-134'}
|
{'https://github.com/brianmario/yajl-ruby', 'https://rubygems.org/gems/yajl-ruby', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516', 'https://github.com/advisories/GHSA-wwh7-4jw9-33x6', 'https://github.com/brianmario/yajl-ruby/issues/176', 'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html'}
| null |
RubyGems
|
GHSA-78vq-9j56-wrfr
|
Cross-site Scripting in gon
|
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
|
{'CVE-2020-25739'}
|
2022-03-03T05:13:59.881533Z
|
2021-04-30T17:29:15Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html', 'https://usn.ubuntu.com/4560-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}
| null |
RubyGems
|
GHSA-5r2p-j47h-mhpg
|
Moderate severity vulnerability that affects rack
|
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
|
{'CVE-2018-16471'}
|
2022-03-03T05:12:46.852569Z
|
2018-11-15T15:59:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'https://usn.ubuntu.com/4089-1/', 'https://github.com/advisories/GHSA-5r2p-j47h-mhpg', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}
| null |
RubyGems
|
GHSA-j5hj-fhc9-g24m
|
Moderate severity vulnerability that affects rack-mini-profiler
|
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
|
{'CVE-2016-4442'}
|
2022-03-03T05:10:09.396301Z
|
2017-10-24T18:33:35Z
|
MODERATE
| null |
{'CWE-200'}
|
{'http://www.openwall.com/lists/oss-security/2016/06/10/2', 'https://github.com/MiniProfiler/rack-mini-profiler/', 'https://github.com/advisories/GHSA-j5hj-fhc9-g24m', 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c', 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}
| null |
RubyGems
|
GHSA-5vx5-9q73-wgp4
|
High severity vulnerability that affects safemode
|
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
|
{'CVE-2017-7540'}
|
2022-03-03T05:13:33.761900Z
|
2017-10-24T18:33:35Z
|
HIGH
| null |
{'CWE-184'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7540', 'https://github.com/svenfuchs/safemode/pull/23', 'https://github.com/advisories/GHSA-5vx5-9q73-wgp4'}
| null |
RubyGems
|
GHSA-8jxj-9r5f-w3m2
|
Low severity vulnerability that affects puppet
|
lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
|
{'CVE-2012-3866'}
|
2022-03-03T05:14:03.097740Z
|
2017-10-24T18:33:37Z
|
LOW
| null | null |
{'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866', 'https://github.com/advisories/GHSA-8jxj-9r5f-w3m2', 'http://www.debian.org/security/2012/dsa-2511', 'http://puppetlabs.com/security/cve/cve-2012-3866/', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=839135', 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}
| null |
RubyGems
|
GHSA-cr5j-953j-xw5p
|
Arbitrary execution of code in Nokogiri
|
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
|
{'CVE-2019-5477'}
|
2022-03-03T05:14:09.872205Z
|
2019-08-19T19:27:23Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://hackerone.com/reports/650835', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477', 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc', 'https://security.gentoo.org/glsa/202006-05', 'https://github.com/sparklemotion/nokogiri/issues/1915', 'https://usn.ubuntu.com/4175-1/'}
| null |
RubyGems
|
GHSA-ww4x-rwq6-qpgf
|
Cross-site Request Forgery in OmniAuth
|
The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
There is currently no fixed version of this package, however there is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284).
|
{'CVE-2015-9284'}
|
2022-03-03T05:13:17.254220Z
|
2019-05-29T19:11:31Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://www.openwall.com/lists/oss-security/2015/05/26/11', 'https://github.com/omniauth/omniauth-rails/pull/1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284', 'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284', 'https://github.com/omniauth/omniauth/pull/809'}
| null |
RubyGems
|
GHSA-8fqx-7pv4-3jwm
|
Moderate severity vulnerability that affects rails
|
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
|
{'CVE-2008-7248'}
|
2022-03-03T05:13:33.636279Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-20'}
|
{'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/', 'http://www.vupen.com/english/advisories/2009/2544', 'http://secunia.com/advisories/36600', 'http://www.openwall.com/lists/oss-security/2009/11/28/1', 'http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1', 'https://github.com/advisories/GHSA-8fqx-7pv4-3jwm', 'http://www.openwall.com/lists/oss-security/2009/12/02/2', 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248', 'http://secunia.com/advisories/38915'}
| null |
RubyGems
|
GHSA-4f68-49qq-h392
|
Improper certificate validation in em-map
|
em-imap 0.5 and earlier use the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
|
{'CVE-2020-13163'}
|
2022-03-03T05:13:33.057318Z
|
2021-05-24T18:12:20Z
|
MODERATE
| null |
{'CWE-295'}
|
{'https://securitylab.github.com/advisories/GHSL-2020-095-conradirwin-em-imap', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13163', 'https://github.com/ConradIrwin/em-imap/issues/25'}
| null |
RubyGems
|
GHSA-69p3-xp37-f692
|
Improper Certificate Validation in kubeclient
|
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).
|
{'CVE-2022-0759'}
|
2022-04-08T22:00:16.365711Z
|
2022-03-26T00:00:29Z
|
HIGH
| null |
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0759', 'https://github.com/ManageIQ/kubeclient/issues/554', 'https://github.com/ManageIQ/kubeclient/issues/555', 'https://github.com/ManageIQ/kubeclient/pull/556', 'https://github.com/ManageIQ/kubeclient'}
| null |
RubyGems
|
GHSA-h29f-7f56-j8wh
|
Moderate severity vulnerability that affects sinatra
|
An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
|
{'CVE-2018-7212'}
|
2022-03-03T05:12:59.959481Z
|
2018-02-20T19:23:20Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c', 'https://github.com/sinatra/sinatra/pull/1379', 'https://github.com/advisories/GHSA-h29f-7f56-j8wh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212', 'https://github.com/sinatra/sinatra'}
| null |
RubyGems
|
GHSA-4g4c-8gqh-m4vm
|
Inclusion of Functionality from Untrusted Control Sphere in Ruby
|
The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5.
|
{'CVE-2019-13589'}
|
2021-05-10T22:18:28Z
|
2019-07-16T00:41:55Z
|
CRITICAL
| null |
{'CWE-829'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-13589', 'http://www.securityfocus.com/bid/109281', 'https://rubygems.org/gems/paranoid2/versions', 'https://github.com/rubygems/rubygems.org/issues/2051', 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600'}
| null |
RubyGems
|
GHSA-p692-7mm3-3fxg
|
actionpack is vulnerable to remote bypass authentication
|
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
|
{'CVE-2015-7576'}
|
2022-04-25T21:01:53.603216Z
|
2017-10-24T18:33:36Z
|
LOW
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/8', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://www.securityfocus.com/bid/81803', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'https://github.com/advisories/GHSA-p692-7mm3-3fxg', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ'}
| null |
RubyGems
|
GHSA-rvpq-5xqx-pfpp
|
High severity vulnerability that affects rails
|
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
|
{'CVE-2006-4111'}
|
2022-03-03T05:14:08.781707Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-94'}
|
{'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits', 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html', 'http://secunia.com/advisories/21466', 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html', 'http://www.vupen.com/english/advisories/2006/3237', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111', 'http://secunia.com/advisories/21749', 'http://www.securityfocus.com/bid/19454', 'http://securitytracker.com/id?1016673', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}
| null |
RubyGems
|
GHSA-2gw2-8q9w-cw8p
|
Ruby-ffi has a DLL loading issue
|
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
|
{'CVE-2018-1000201'}
|
2022-04-26T18:33:00.711228Z
|
2018-08-31T14:55:43Z
|
HIGH
| null |
{'CWE-426'}
|
{'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c', 'https://github.com/advisories/GHSA-2gw2-8q9w-cw8p', 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201'}
| null |
RubyGems
|
GHSA-3q49-h8f9-9fr9
|
Missing TLS certificate verification
|
Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of
its client. Those libraries both use the [`EM::Connection#start_tls`][1] method
in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is
used for the connection. This method does not implement certificate verification
by default, meaning that it does not check that the server presents a valid and
trusted TLS certificate for the expected hostname. That means that any `https:`
or `wss:` connection made using these libraries is vulnerable to a
man-in-the-middle attack, since it does not confirm the identity of the server
it is connected to.
The first request a Faye client makes is always sent via normal HTTP, but later
messages may be sent via WebSocket. Therefore it is vulnerable to the same
problem that these underlying libraries are, and we needed both libraries to
support TLS verification before Faye could claim to do the same. Your client
would still be insecure if its initial HTTPS request was verified, but later
WebSocket connections were not.
This has been a requested feature in EventMachine for many years now; see for
example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request
published an [advisory][7] related to this problem and fixed it by [implementing
TLS verification][8] in their own codebase; although EventMachine does not
implement certificate verification itself, it provides an extension point for
the caller to implement it, called [`ssl_verify_peer`][9]. Based on this
implementation, we have incorporated similar functionality into faye-websocket.
After implementing verification in v1.1.6, em-http-request has elected to leave
the `:verify_peer` option switched off by default. We have decided to _enable_
this option by default in Faye, but are publishing a minor release with added
functionality for configuring it. We are mindful of the fact that this may break
existing programs, but we consider it much more important that all clients have
TLS verification turned on by default. A client that is not carrying out
verification is either:
- talking to the expected server, and will not break under this change
- being attacked, and would benefit from being alerted to this fact
- deliberately talking to a server that would be rejected by verification
The latter case includes situations like talking to a non-public server using a
self-signed certificate. We consider this use case to be "working by accident",
rather than functionality that was actively supported, and it should be properly
and explicitly supported instead.
We are releasing Faye v1.4.0, which enables verification by default and provides
a way to opt out of it:
```rb
client = Faye::Client.new('https://example.com/', tls: { verify_peer: false })
```
Unfortunately we can't offer an equivalent of the `:root_cert_file` option that
has been added to faye-websocket, because em-http-request does not support it.
If you need to talk to servers whose certificates are not recognised by your
default root certificates, then you need to add its certificate (or another one
that can verify it) to your system's root set.
The same functionality is now supported in the Node.js version, with a `tls`
option whose values will be passed to the `https` and `tls` modules as
appropriate when making connections. For example, you can provide your own CA
certificate:
```js
var client = new faye.Client('https://example.com/', {
tls: {
ca: fs.readFileSync('path/to/certificate.pem')
}
});
```
For further background information on this issue, please see [faye#524][12] and
[faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel
Morsing][15] for providing invaluable assistance and feedback on this issue.
[1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls
[2]: https://rubygems.org/gems/eventmachine
[3]: https://github.com/eventmachine/eventmachine/issues/275
[4]: https://github.com/eventmachine/eventmachine/pull/378
[5]: https://github.com/eventmachine/eventmachine/issues/814
[6]: https://rubygems.org/gems/em-http-request
[7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request
[8]: https://github.com/igrigorik/em-http-request/pull/340
[9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer
[10]: https://rubygems.org/gems/faye-websocket
[11]: https://faye.jcoglan.com/
[12]: https://github.com/faye/faye/issues/524
[13]: https://github.com/faye/faye-websocket-ruby/pull/129
[14]: https://github.com/SpComb
[15]: https://github.com/DanielMorsing
|
{'CVE-2020-15134'}
|
2022-03-03T05:13:02.251112Z
|
2020-07-31T17:39:42Z
|
HIGH
| null |
{'CWE-295'}
|
{'https://github.com/faye/faye/issues/524', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/eventmachine/eventmachine/pull/378'}
| null |
RubyGems
|
GHSA-j6w9-fv6q-3q52
|
Percent-encoded cookies can be used to overwrite existing prefixed cookie names
|
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
|
{'CVE-2020-8184'}
|
2022-03-03T05:14:04.623248Z
|
2020-06-24T17:15:00Z
|
HIGH
| null |
{'CWE-784'}
|
{'https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak', 'https://hackerone.com/reports/895727', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml', 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8184', 'https://usn.ubuntu.com/4561-1/', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html'}
| null |
RubyGems
|
GHSA-6x46-7rrv-m4h8
|
Low severity vulnerability that affects sqlite3-ruby
|
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
|
{'CVE-2011-0995'}
|
2022-03-03T05:14:14.300643Z
|
2017-10-24T18:33:38Z
|
LOW
| null | null |
{'http://support.novell.com/security/cve/CVE-2011-0995.html', 'http://secunia.com/advisories/44418', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995', 'http://www.osvdb.org/72180', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263', 'https://bugzilla.novell.com/show_bug.cgi?id=685928', 'http://www.securityfocus.com/bid/47694', 'https://github.com/advisories/GHSA-6x46-7rrv-m4h8'}
| null |
RubyGems
|
GHSA-mh37-8c3g-3fgc
|
Escape sequence injection in RubyGems
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
|
{'CVE-2019-8322'}
|
2022-03-03T05:14:20.730554Z
|
2019-06-20T16:06:00Z
|
HIGH
| null | null |
{'https://hackerone.com/reports/315087', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
| null |
RubyGems
|
GHSA-jwhv-rgqc-fqj5
|
Moderate severity vulnerability that affects rails
|
Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
|
{'CVE-2007-5380'}
|
2022-03-03T05:14:05.282733Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-384'}
|
{'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5', 'http://www.novell.com/linux/security/advisories/2007_25_sr.html', 'http://www.vupen.com/english/advisories/2007/3508', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://www.securityfocus.com/bid/26096', 'http://docs.info.apple.com/article.html?artnum=307179', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380', 'https://github.com/rails/rails', 'http://secunia.com/advisories/28136', 'http://secunia.com/advisories/27965', 'http://secunia.com/advisories/27657', 'http://www.vupen.com/english/advisories/2007/4238'}
| null |
RubyGems
|
GHSA-gwrj-88fp-5m36
|
Code injection in Narou
|
Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel.
|
{'CVE-2021-35514'}
|
2022-03-03T05:13:07.602213Z
|
2021-07-02T18:36:01Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://vuln.ryotak.me/advisories/51', 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42', 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514'}
| null |
RubyGems
|
GHSA-4936-rj25-6wm6
|
High severity vulnerability that affects nori
|
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
|
{'CVE-2013-0285'}
|
2022-03-03T05:14:19.397843Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285', 'https://github.com/advisories/GHSA-4936-rj25-6wm6', 'http://seclists.org/oss-sec/2013/q1/304'}
| null |
RubyGems
|
GHSA-c6qr-h5vq-59jc
|
Untrusted users can run pending migrations in production in Rails
|
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed
an untrusted user to run any pending migrations on a Rails app running in
production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 < rails < 6.0.3.2
Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production)
Fixed Versions: rails >= 6.0.3.2
Impact
------
Using this issue, an attacker would be able to execute any migrations that
are pending for a Rails app running in production mode. It is important to
note that an attacker is limited to running migrations the application
developer has already defined in their application and ones that have not
already ran.
Workarounds
-----------
Until such time as the patch can be applied, application developers should
disable the ActionDispatch middleware in their production environment via
a line such as this one in their config/environment/production.rb:
`config.middleware.delete ActionDispatch::ActionableExceptions`
|
{'CVE-2020-8185'}
|
2022-03-03T05:14:11.823792Z
|
2020-06-24T17:40:33Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://hackerone.com/reports/899069', 'https://groups.google.com/g/rubyonrails-security/c/pAe9EV8gbM0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185', 'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8185.yml'}
| null |
RubyGems
|
GHSA-p4x4-rw2p-8j8m
|
Cross-site Scripting in Sanitize
|
When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist.
You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements:
- `iframe`
- `math`
- `noembed`
- `noframes`
- `noscript`
- `plaintext`
- `script`
- `style`
- `svg`
- `xmp`
### Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser.
### Releases
This problem has been fixed in Sanitize 5.2.1.
### Workarounds
If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist:
```ruby
%w[iframe math noembed noframes noscript plaintext script style svg xmp]
```
For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this:
```ruby
custom_config = Sanitize::Config.merge(
Sanitize::Config::RELAXED,
:remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp]
)
```
You would then pass this custom config to Sanitize when sanitizing HTML.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize).
- See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy).
### Credits
Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix.
### References
- [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m)
- [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054)
- https://github.com/rgrove/sanitize/releases/tag/v5.2.1
|
{'CVE-2020-4054'}
|
2022-03-03T05:13:26.390326Z
|
2020-06-16T22:08:06Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/rgrove/sanitize/releases/tag/v5.2.1', 'https://usn.ubuntu.com/4543-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://www.debian.org/security/2020/dsa-4730'}
| null |
RubyGems
|
GHSA-rprj-g6xc-p5gq
|
Moderate severity vulnerability that affects wicked
|
Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step.
|
{'CVE-2013-4413'}
|
2022-03-03T05:14:13.648715Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-22'}
|
{'http://www.securityfocus.com/bid/62891', 'http://secunia.com/advisories/55151', 'https://github.com/schneems/wicked', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413', 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}
| null |
RubyGems
|
GHSA-wg9m-gw3h-hg83
|
Injection in field_test
|
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).
|
{'CVE-2019-13146'}
|
2021-05-11T14:27:51Z
|
2019-07-16T00:42:27Z
|
MODERATE
| null |
{'CWE-74'}
|
{'http://www.securityfocus.com/bid/109114', 'https://rubygems.org/gems/field_test', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13146', 'https://github.com/ankane/field_test/issues/17'}
| null |
RubyGems
|
GHSA-qphc-hf5q-v8fc
|
Open Redirect in actionpack
|
Specially crafted "X-Forwarded-Host" headers in combination with certain
"allowed host" formats can cause the Host Authorization middleware in Action
Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example,
configuration files that look like this:
```
config.hosts << '.EXAMPLE.com'
```
When an allowed host contains a leading dot, a specially crafted Host header
can be used to redirect to a malicious website.
This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942.
Releases
--------
The fixed releases are available at the normal locations.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series
* 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series
* 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
|
{'CVE-2021-44528'}
|
2022-04-27T22:32:00.332117Z
|
2021-12-14T21:19:08Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/rails/rails', 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}
| null |
RubyGems
|
GHSA-hgmw-x865-hf9x
|
High severity vulnerability that affects arabic-prawn
|
lib/string_utf_support.rb in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.
|
{'CVE-2014-2322'}
|
2022-03-07T20:48:01.952688Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2014-2322', 'https://github.com/ozeron/prawn-arabic', 'http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html', 'http://www.openwall.com/lists/oss-security/2014/03/12/6', 'https://github.com/advisories/GHSA-hgmw-x865-hf9x', 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}
| null |
RubyGems
|
GHSA-r5hc-9xx5-97rw
|
Moderate severity vulnerability that affects i18n
|
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
|
{'CVE-2013-4492'}
|
2022-03-03T05:13:54.902315Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/64076', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'http://www.debian.org/security/2013/dsa-2830', 'https://github.com/svenfuchs/i18n', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}
| null |
RubyGems
|
GHSA-j858-xp5v-f8xx
|
Remote code execution in Dragonfly
|
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
|
{'CVE-2021-33564'}
|
2022-03-03T05:13:58.950700Z
|
2021-06-02T21:42:49Z
|
CRITICAL
| null |
{'CWE-94', 'CWE-88'}
|
{'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/', 'https://github.com/mlr0p/CVE-2021-33564', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0'}
| null |
RubyGems
|
GHSA-844m-cpr9-jcmh
|
Secure/signed cookies share secrets between sites in a multi-site application
|
### Impact
This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application.
### Patches
The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
|
{'CVE-2021-41263'}
|
2022-03-03T05:12:57.242829Z
|
2021-11-15T17:54:01Z
|
MODERATE
| null |
{'CWE-200', 'CWE-565'}
|
{'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite'}
| null |
RubyGems
|
GHSA-25f5-gc4h-hc22
|
Improper Privilege Management in devise_masquerade
|
The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secret_key_base value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devise_masquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.
|
{'CVE-2021-28680'}
|
2022-03-03T05:14:04.409248Z
|
2021-12-08T19:55:30Z
|
HIGH
| null |
{'CWE-269'}
|
{'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1', 'https://github.com/oivoodoo/devise_masquerade/pull/76', 'https://github.com/oivoodoo/devise_masquerade', 'https://github.com/oivoodoo/devise_masquerade/issues/83', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680', 'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/'}
| null |
RubyGems
|
GHSA-5v3f-73gv-x7x5
|
cairo is vulnerable to denial of service due to a null pointer dereference
|
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
|
{'CVE-2017-7475'}
|
2022-04-25T20:55:52Z
|
2017-11-15T20:41:14Z
|
MODERATE
| null |
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-5v3f-73gv-x7x5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475', 'https://bugs.freedesktop.org/show_bug.cgi?id=100763', 'http://seclists.org/oss-sec/2017/q2/151', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}
| null |
RubyGems
|
GHSA-9h6g-gp95-x3q5
|
actionpack is vulnerable to denial of service because of a wildcard controller route
|
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
|
{'CVE-2015-7581'}
|
2022-04-25T21:01:52.994027Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7581', 'http://www.securityfocus.com/bid/81677', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/16', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'https://github.com/advisories/GHSA-9h6g-gp95-x3q5', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ'}
| null |
RubyGems
|
GHSA-5pm8-492c-92p5
|
Prototype Pollution in chartkick
|
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server.
## Recommendation
Upgrade to version 3.2.0 or later.
|
{'CVE-2019-18841'}
|
2022-03-03T05:12:51.639263Z
|
2019-12-02T18:04:11Z
|
HIGH
| null | null |
{'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/ankane/chartkick.js/issues/117', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://www.npmjs.com/advisories/1312', 'https://github.com/ankane/chartkick/commits/master', 'https://rubygems.org/gems/chartkick/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://chartkick.com'}
| null |
RubyGems
|
GHSA-699m-mcjm-9cw8
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
|
{'CVE-2013-4491'}
|
2022-03-03T05:13:15.739975Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/64076', 'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://puppet.com/security/cve/cve-2013-4491', 'http://secunia.com/advisories/57836', 'https://github.com/advisories/GHSA-699m-mcjm-9cw8', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ'}
| null |
RubyGems
|
GHSA-r7j3-vvh2-xrpj
|
OS Command Injection in MiniMagick
|
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
|
{'CVE-2019-13574'}
|
2022-03-03T05:13:10.705994Z
|
2019-07-18T13:19:22Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://www.debian.org/security/2019/dsa-4481', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4', 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/'}
| null |
RubyGems
|
GHSA-534w-937m-v7x3
|
High severity vulnerability that affects restforce
|
A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests.
Impact
------
This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods.
Vulnerable code might look like:
```ruby
client.select('SomeSalesForceObject', params[:some-id],
...)
```
In such an application, attackers could pass `0016000000MRatd/describe` as a request parameter, causing the server to make a request to a different endpoint than the server is designed to handle. Since the Salesforce REST API supports overriding HTTP methods via a request parameter, an attacker could also cause the client's `select()` method to modify data, by passing `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`.
Workarounds
------
If possible, applications should track salesforce IDs internally, rather than passing user-supplied IDs to salesforce. Such practice mitigates this vulnerability, and in general is desirable for ensuring strong access control.
|
{'CVE-2018-3777'}
|
2022-03-03T05:13:39.195821Z
|
2018-08-03T21:04:02Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/restforce/restforce/pull/392', 'https://github.com/advisories/GHSA-534w-937m-v7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777'}
| null |
RubyGems
|
GHSA-x7p2-x2j6-mwhr
|
Moderate severity vulnerability that affects gemirro
|
Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
|
{'CVE-2017-16833'}
|
2022-03-03T05:13:32.757913Z
|
2017-11-29T23:19:51Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/PierreRambaud/gemirro', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de', 'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}
| null |
RubyGems
|
GHSA-76wq-xw4h-f8wj
|
High severity vulnerability that affects activerecord
|
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
|
{'CVE-2012-2695'}
|
2022-03-03T05:13:37.613632Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-89'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://github.com/advisories/GHSA-76wq-xw4h-f8wj', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}
| null |
RubyGems
|
GHSA-73qw-ww62-m54x
|
Critical severity vulnerability that affects colorscore
|
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
|
{'CVE-2015-7541'}
|
2022-03-03T05:12:47.605634Z
|
2017-10-24T18:33:36Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'http://rubysec.com/advisories/CVE-2015-7541/', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541', 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}
| null |
RubyGems
|
GHSA-jmm9-2p29-vh2w
|
High severity vulnerability that affects activerecord
|
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
|
{'CVE-2011-0448'}
|
2022-03-03T05:14:10.987481Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-89'}
|
{'http://secunia.com/advisories/43278', 'http://securitytracker.com/id?1025063', 'http://www.vupen.com/english/advisories/2011/0877', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'https://github.com/advisories/GHSA-jmm9-2p29-vh2w', 'https://github.com/rails/rails', 'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain'}
| null |
RubyGems
|
GHSA-2xjj-5x6h-8vmf
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
|
{'CVE-2012-1099'}
|
2022-03-03T05:13:12.679378Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=799276', 'http://www.debian.org/security/2012/dsa-2466', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html', 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099', 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}
| null |
RubyGems
|
GHSA-pchc-949f-53m5
|
High severity vulnerability that affects multi_xml
|
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
|
{'CVE-2013-0175'}
|
2022-03-03T05:13:26.469460Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175', 'https://news.ycombinator.com/item?id=5040457', 'https://github.com/sferik/multi_xml', 'https://github.com/sferik/multi_xml/pull/34', 'https://gist.github.com/nate/d7f6d9f4925f413621aa', 'http://www.openwall.com/lists/oss-security/2013/01/11/9', 'https://github.com/advisories/GHSA-pchc-949f-53m5'}
| null |
RubyGems
|
GHSA-vxvp-4xwc-jpp6
|
Moderate severity vulnerability that affects activesupport
|
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
|
{'CVE-2015-3226'}
|
2022-03-03T05:12:47.891996Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securitytracker.com/id/1033755', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ', 'http://openwall.com/lists/oss-security/2015/06/16/17', 'http://www.securityfocus.com/bid/75231', 'https://github.com/advisories/GHSA-vxvp-4xwc-jpp6', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}
| null |
RubyGems
|
GHSA-fh39-v733-mxfr
|
Moderate severity vulnerability that affects activerecord
|
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
|
{'CVE-2012-2661'}
|
2022-03-03T05:13:01.957838Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2012-2661', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://github.com/advisories/GHSA-fh39-v733-mxfr', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
| null |
RubyGems
|
GHSA-5m2v-hc64-56h6
|
A crafted ZIP file can cause a denial of service in Rubyzip
|
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
|
{'CVE-2019-16892'}
|
2022-03-03T05:13:01.977335Z
|
2019-09-30T16:05:32Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16892', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/', 'https://access.redhat.com/errata/RHBA-2019:4047', 'https://github.com/jdleesmiller/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/', 'https://github.com/rubyzip/rubyzip/pull/403', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/', 'https://access.redhat.com/errata/RHSA-2019:4201'}
| null |
RubyGems
|
GHSA-q3wr-qw3g-3p4h
|
Injection/XSS in Redcarpet
|
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
|
{'CVE-2020-26298'}
|
2022-03-03T05:13:23.703389Z
|
2021-01-11T19:06:10Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.debian.org/security/2021/dsa-4831', 'https://rubygems.org/gems/redcarpet', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html', 'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security', 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26298'}
| null |
RubyGems
|
GHSA-26xx-m4q2-xhq8
|
Authentication Bypass by CSRF Weakness
|
### Impact
CSRF vulnerability that allows user account takeover.
All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
* Executed whether as:
* A before_action callback (the default)
* A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
Thanks @waiting-for-dev for reporting and providing a patch 👏
### Patches
Spree 4.3 users should update to spree_auth_devise 4.4.1
Spree 4.2 users should update to spree_auth_devise 4.2.1
Spree 4.1 users should update to spree_auth_devise 4.1.1
Older Spree version users should update to spree_auth_devise 4.0.1
### Workarounds
If possible, change your strategy to :exception:
```ruby
class ApplicationController < ActionController::Base
protect_from_forgery with: :exception
end
```
Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
```ruby
config.after_initialize do
Spree::UsersController.protect_from_forgery with: :exception
end
```
### References
https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
|
{'CVE-2021-41275'}
|
2022-03-03T05:12:54.592023Z
|
2021-11-18T20:14:19Z
|
CRITICAL
| null |
{'CWE-352'}
|
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-26xx-m4q2-xhq8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275', 'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
| null |
RubyGems
|
GHSA-g4xq-jx4w-4cjv
|
Moderate severity vulnerability that affects loofah
|
In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3.
See https://github.com/flavorjones/loofah/issues/154 for more details.
|
{'CVE-2018-16468'}
|
2022-03-03T05:13:37.053955Z
|
2018-11-01T14:46:01Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-g4xq-jx4w-4cjv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468', 'https://www.debian.org/security/2019/dsa-4364', 'https://github.com/flavorjones/loofah/issues/154'}
| null |
RubyGems
|
GHSA-9h36-4jf2-hx53
|
High severity vulnerability that affects extlib
|
The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
|
{'CVE-2013-1802'}
|
2022-03-03T05:13:47.352463Z
|
2017-10-24T18:33:37Z
|
HIGH
| null | null |
{'https://bugzilla.redhat.com/show_bug.cgi?id=917233', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802', 'https://github.com/advisories/GHSA-9h36-4jf2-hx53', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html', 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}
| null |
RubyGems
|
GHSA-gjxw-5w2q-7grf
|
Moderate severity vulnerability that affects rails
|
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
|
{'CVE-2010-3933'}
|
2022-03-03T05:13:52.955482Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-20'}
|
{'http://securitytracker.com/id?1024624', 'https://github.com/advisories/GHSA-gjxw-5w2q-7grf', 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0', 'http://www.vupen.com/english/advisories/2010/2719', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933', 'http://secunia.com/advisories/41930'}
| null |
RubyGems
|
GHSA-j24p-r6wx-r79w
|
High severity vulnerability that affects thin
|
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
|
{'CVE-2009-3287'}
|
2022-03-03T05:13:18.776632Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2009-3287', 'http://github.com/macournoyer/thin', 'http://github.com/macournoyer/thin/blob/master/CHANGELOG', 'https://github.com/advisories/GHSA-j24p-r6wx-r79w', 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a', 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}
| null |
RubyGems
|
GHSA-x7jg-6pwg-fx5h
|
HTTP Smuggling via Transfer-Encoding Header in Puma
|
### Impact
By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling)
Originally reported by @ZeddYu, who has our thanks for the detailed report.
### Patches
The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
|
{'CVE-2020-11076'}
|
2022-03-03T05:13:40.798691Z
|
2020-05-22T14:55:05Z
|
HIGH
| null |
{'CWE-444'}
|
{'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h', 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'}
| null |
RubyGems
|
GHSA-jphg-qwrw-7w9g
|
Unsafe object creation in json RubyGem
|
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
|
{'CVE-2020-10663'}
|
2022-03-03T05:12:49.265606Z
|
2020-07-27T18:08:21Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4721', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/', 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://support.apple.com/kb/HT211931', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Dec/32', 'https://github.com/flori/json', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html', 'https://security.netapp.com/advisory/ntap-20210129-0003/', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663', 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E'}
| null |
RubyGems
|
GHSA-vqqv-v9m2-48p2
|
Critical severity vulnerability that affects bootstrap-sass
|
Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.
|
{'CVE-2019-10842'}
|
2021-09-20T22:15:48Z
|
2019-04-04T16:28:47Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'http://dgb.github.io/2019/04/05/bootstrap-sass-backdoor.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842', 'https://github.com/twbs/bootstrap-sass/issues/1195', 'https://github.com/twbs/bootstrap-sass', 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093', 'https://github.com/advisories/GHSA-vqqv-v9m2-48p2', 'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/'}
| null |
RubyGems
|
GHSA-qp49-3pvw-x4m5
|
sinatra does not validate expanded path matches
|
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
|
{'CVE-2022-29970'}
|
2022-05-03T21:02:03.543510Z
|
2022-05-03T00:00:43Z
|
MODERATE
| null |
{'CWE-426'}
|
{'https://github.com/skylightio/skylight-ruby/pull/294', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29970', 'https://github.com/sinatra/sinatra/', 'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.