ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
RubyGems
GHSA-c5qq-g673-5p49
Low severity vulnerability that affects puppet
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
{'CVE-2012-1989'}
2022-03-03T05:13:46.805744Z
2017-10-24T18:33:38Z
LOW
null
null
{'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797', 'http://secunia.com/advisories/49136', 'http://ubuntu.com/usn/usn-1419-1', 'https://github.com/advisories/GHSA-c5qq-g673-5p49', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989', 'http://secunia.com/advisories/48743', 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html', 'http://secunia.com/advisories/48748', 'https://hermes.opensuse.org/messages/15087408', 'http://www.securityfocus.com/bid/52975', 'http://puppetlabs.com/security/cve/cve-2012-1989/', 'http://projects.puppetlabs.com/issues/13606'}
null
RubyGems
GHSA-9pr6-grf4-x2fr
Omniauth allows POST parameters to be stored in session
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
{'CVE-2017-18076'}
2022-04-25T22:31:54.505893Z
2018-01-29T15:45:28Z
HIGH
null
null
{'https://github.com/advisories/GHSA-9pr6-grf4-x2fr', 'https://github.com/omniauth/omniauth/pull/867', 'https://bugs.debian.org/888523', 'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b', 'https://www.debian.org/security/2018/dsa-4109', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076', 'https://github.com/omniauth/omniauth'}
null
RubyGems
GHSA-qpg4-4w7w-2mq5
Authentication and extension bypass in Faye
On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1.2.5, which we are releasing today. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. For example, the Faye [extension docs][2] suggest that users implement access control for subscriptions by checking incoming messages for the `/meta/subscribe` channel, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel === '/meta/subscribe') { if (message.ext.authToken !== 'my super secret password') { message.error = 'Invalid auth token'; } } callback(message); } }); ``` A bug in the server's code for recognising the special `/meta/*` channels, which trigger connection and subscription events, means that a client can bypass this check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`: ```json { "channel": "/meta/subscribe/x", "clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3", "subscription": "/foo" } ``` This message will not be checked by the above extension, as it checks the message's channel is exactly equal to `/meta/subscribe`. But it will still be processed as a subscription request by the server, so the client becomes subscribed to the channel `/foo` without supplying the necessary credentials. The vulnerability is caused by the way the Faye server recognises meta channels. It will treat a message to any channel that's a prefix-match for one of the special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for that channel. So, a message to `/meta/subscribe/x` is still processed as a subscription request, for example. An authentication bypass for subscription requests is the most serious effect of this but all other meta channels are susceptible to similar manipulation. This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. These should be drop-in replacements for prior versions and you should upgrade immediately if you are running any prior version. If you are unable to install one of these versions, you can make your extensions catch all messages the server would process by checking the channel _begins_ with the expected channel name, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel.startsWith('/meta/subscribe')) { // authentication logic } callback(message); } }); ``` [1]: https://faye.jcoglan.com/ [2]: https://faye.jcoglan.com/node/extensions.html
{'CVE-2020-11020'}
2022-03-03T05:13:00.204591Z
2020-04-29T17:41:15Z
HIGH
null
{'CWE-287'}
{'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020'}
null
RubyGems
GHSA-mg5p-95m9-rmfp
Arbitrary file write in actionpack-page_caching gem
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
{'CVE-2020-8159'}
2022-04-07T15:17:02.937159Z
2020-05-13T16:28:46Z
CRITICAL
null
{'CWE-22'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
null
RubyGems
GHSA-pc3m-v286-2jwj
Moderate severity vulnerability that affects actionview
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
{'CVE-2016-6316'}
2022-03-03T05:13:12.953674Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/92430', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'http://www.debian.org/security/2016/dsa-3651', 'http://www.openwall.com/lists/oss-security/2016/08/11/3', 'https://github.com/advisories/GHSA-pc3m-v286-2jwj', 'https://puppet.com/security/cve/cve-2016-6316', 'http://rhn.redhat.com/errata/RHSA-2016-1857.html', 'http://rhn.redhat.com/errata/RHSA-2016-1858.html', 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE', 'http://rhn.redhat.com/errata/RHSA-2016-1856.html', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}
null
RubyGems
GHSA-jxhw-mg8m-2pj8
Moderate severity vulnerability that affects devise
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
{'CVE-2013-0233'}
2022-03-03T05:12:37.324141Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'http://www.openwall.com/lists/oss-security/2013/01/29/3', 'http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html', 'https://github.com/advisories/GHSA-jxhw-mg8m-2pj8', 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/', 'https://github.com/Snorby/snorby/issues/261', 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset', 'https://github.com/Snorby/snorby', 'http://www.securityfocus.com/bid/57577', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html'}
null
RubyGems
GHSA-xrr6-3pc4-m447
Moderate severity vulnerability that affects activerecord
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
{'CVE-2015-7577'}
2022-03-03T05:12:59.043829Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-284'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/cawsWcQ6c8g/LATIsglZEgAJ', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/10', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577', 'https://github.com/advisories/GHSA-xrr6-3pc4-m447', 'http://www.securitytracker.com/id/1034816', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securityfocus.com/bid/81806', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
null
RubyGems
GHSA-6jvm-3j5h-79f6
Moderate severity vulnerability that affects paperclip
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
{'CVE-2015-2963'}
2022-03-03T05:13:20.403613Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088', 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57', 'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://robots.thoughtbot.com/paperclip-security-release', 'https://github.com/thoughtbot/paperclip', 'http://www.securityfocus.com/bid/75304', 'http://openwall.com/lists/oss-security/2015/06/19/3', 'https://github.com/advisories/GHSA-6jvm-3j5h-79f6'}
null
RubyGems
GHSA-f8cm-364f-q9qh
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
### Impact The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints. ### Patches Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. ### Workarounds In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents: ```ruby module Spree module Api module V2 module BaseControllerDecorator private def spree_current_user return nil unless doorkeeper_token return @spree_current_user if @spree_current_user doorkeeper_authorize! @spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id) end end end end Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator) ``` ### For more information If you have any questions or comments about this advisory: * Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
{'CVE-2020-15269'}
2022-03-03T05:14:18.631312Z
2020-10-20T20:03:52Z
HIGH
null
{'CWE-613', 'CWE-287'}
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269', 'https://github.com/spree/spree'}
null
RubyGems
GHSA-xf96-32q2-9rw2
High severity vulnerability that affects rails
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
{'CVE-2008-4094'}
2022-03-03T05:11:30.116458Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-89'}
{'http://secunia.com/advisories/31875', 'http://rails.lighthouseapp.com/projects/8994/tickets/288', 'http://secunia.com/advisories/31910', 'http://www.openwall.com/lists/oss-security/2008/09/13/2', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109', 'http://www.securityfocus.com/bid/31176', 'http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1', 'http://www.vupen.com/english/advisories/2008/2562', 'https://github.com/advisories/GHSA-xf96-32q2-9rw2', 'http://rails.lighthouseapp.com/projects/8994/tickets/964', 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094', 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter/', 'http://secunia.com/advisories/31909', 'http://www.securitytracker.com/id?1020871', 'https://github.com/rails/rails', 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://www.openwall.com/lists/oss-security/2008/09/16/1', 'http://gist.github.com/8946'}
null
RubyGems
GHSA-6mqr-q86q-6gwr
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2021-11-18T19:52:03Z
2021-11-18T20:15:09Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-59c7-4xj2-hgvw
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
{'CVE-2015-7578'}
2022-03-03T05:12:07.032028Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://github.com/rails/rails-html-sanitizer/', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}
null
RubyGems
GHSA-ggxm-pgc9-g7fp
Arbitrary Code Execution in rdoc
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
{'CVE-2021-31799'}
2022-04-22T15:47:43.374950Z
2021-09-01T18:53:15Z
HIGH
null
{'CWE-74', 'CWE-77'}
{'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://github.com/ruby/rdoc', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'}
null
RubyGems
GHSA-qf9q-q4hh-qph3
SQL injection in blazer
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
{'CVE-2022-29498'}
2022-04-29T21:16:59.900885Z
2022-04-22T00:00:36Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29498', 'https://github.com/ankane/blazer', 'https://github.com/ankane/blazer/issues/392'}
null
RubyGems
GHSA-mp78-r56v-45qc
Moderate severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in Ember.js 1.10.x before 1.10.1 and 1.11.x before 1.11.2.
{'CVE-2015-1866'}
2022-03-03T05:14:17.947267Z
2018-08-28T22:34:31Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-mp78-r56v-45qc', 'http://www.securityfocus.com/bid/74185', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1866', 'https://emberjs.com/blog/2015/04/14/security-and-bugfix-releases-ember-1-10-1-1-11-2-1-11-3.html', 'http://www.openwall.com/lists/oss-security/2015/04/14/11'}
null
RubyGems
GHSA-gpqc-4pp7-5954
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 Spree 4.1 users should update to spree_auth_devise 4.1.1 Older Spree version users should update to spree_auth_devise 4.0.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
null
2022-03-03T05:13:18.626996Z
2021-11-18T20:15:35Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954', 'https://github.com/spree/spree_auth_devise', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-9hx9-w2j6-rw76
Low severity vulnerability that affects show_in_browser
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.
{'CVE-2013-2105'}
2020-06-16T21:28:50Z
2017-10-24T18:33:37Z
LOW
null
{'CWE-59'}
{'http://vapid.dhs.org/advisories/show_in_browser.html', 'http://www.openwall.com/lists/oss-security/2013/05/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105', 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}
null
RubyGems
GHSA-fwcm-636p-68r5
Server-side request forgery in CarrierWave
### Impact [CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. ### Patches Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). ### Workarounds Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access. ### References [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) * Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
{'CVE-2021-21288'}
2022-03-03T05:13:46.424790Z
2021-02-08T19:16:26Z
LOW
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://rubygems.org/gems/carrierwave/'}
null
RubyGems
GHSA-vm28-mrm7-fpjq
High severity vulnerability that affects sfpagent
lib/sfpagent/bsig.rb in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
{'CVE-2014-2888'}
2022-03-03T05:13:10.883602Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-77'}
{'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html', 'https://github.com/advisories/GHSA-vm28-mrm7-fpjq', 'http://www.openwall.com/lists/oss-security/2014/04/18/4', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888', 'http://seclists.org/fulldisclosure/2014/Apr/243', 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}
null
RubyGems
GHSA-x7rv-cr6v-4vm4
Moderate severity vulnerability that affects loofah
Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments. Users are affected if running Loofah < 2.2.1, but only: * when running on MRI or RBX, * in combination with libxml2 >= 2.9.2. Please note: JRuby users are not affected.
{'CVE-2018-8048'}
2022-03-03T05:14:04.943637Z
2018-03-21T11:57:11Z
MODERATE
null
{'CWE-79'}
{'https://github.com/flavorjones/loofah/issues/144', 'https://github.com/flavorjones/loofah/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8048', 'https://github.com/advisories/GHSA-x7rv-cr6v-4vm4', 'https://www.debian.org/security/2018/dsa-4171', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'http://www.openwall.com/lists/oss-security/2018/03/19/5'}
null
RubyGems
GHSA-9p29-94hp-8rvc
XSS in qiita-markdown
Increments Qiita::Markdown before 0.34.0 allows XSS via a crafted gist link, a different vulnerability than CVE-2021-28796.
{'CVE-2021-28833'}
2022-03-03T05:13:17.293242Z
2021-08-02T17:22:07Z
MODERATE
null
{'CWE-79'}
{'https://vuln.ryotak.me/advisories/50', 'https://github.com/increments/qiita-markdown/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28833'}
null
RubyGems
GHSA-mj4x-wcxf-hm8x
Json-jwt (RubyGems) did not verify, or incorrectly verifies, the cryptographic signature for data
The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
{'CVE-2018-1000539'}
2022-04-26T18:33:05.770261Z
2018-07-31T18:13:51Z
MODERATE
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539', 'https://github.com/nov/json-jwt/pull/62', 'https://github.com/nov/json-jwt', 'https://github.com/advisories/GHSA-mj4x-wcxf-hm8x', 'https://www.debian.org/security/2018/dsa-4283'}
null
RubyGems
GHSA-98mf-8f57-64qf
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
{'CVE-2012-3463'}
2022-03-03T05:14:10.133908Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://github.com/advisories/GHSA-98mf-8f57-64qf', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}
null
RubyGems
GHSA-x3rq-r3cm-5vc4
Business Logic Errors in Publify
Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors.
{'CVE-2022-0524'}
2022-03-03T05:12:56.204589Z
2022-02-09T00:00:27Z
HIGH
null
null
{'https://github.com/publify/publify/releases/tag/v9.2.7', 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5', 'https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d', 'https://github.com/publify/publify/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}
null
RubyGems
GHSA-w248-xr37-jx8m
High severity vulnerability that affects fastreader
lib/entry_controller.rb in the fastreader Gem 1.0.8 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
{'CVE-2013-2615'}
2022-03-03T05:12:53.091428Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615', 'http://www.osvdb.org/91232', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'https://github.com/advisories/GHSA-w248-xr37-jx8m', 'http://seclists.org/fulldisclosure/2013/Mar/122', 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}
null
RubyGems
GHSA-mvw8-v767-qhjm
Moderate severity vulnerability that affects radiant
Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter to an admin/pages/*/edit resource.
{'CVE-2018-5216'}
2022-03-03T05:13:04.487795Z
2018-01-06T01:11:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/imsebao/404team', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216', 'https://github.com/imsebao/404team/blob/master/radiantcms.md', 'https://github.com/advisories/GHSA-mvw8-v767-qhjm'}
null
RubyGems
GHSA-g89m-3wjw-h857
Low severity vulnerability that affects puppet
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
{'CVE-2012-3865'}
2022-03-03T05:13:46.452209Z
2017-10-24T18:33:37Z
LOW
null
{'CWE-22'}
{'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://github.com/advisories/GHSA-g89m-3wjw-h857', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'http://puppetlabs.com/security/cve/cve-2012-3865/', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=839131', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}
null
RubyGems
GHSA-f599-5m7p-hcpf
Moderate severity vulnerability that affects grape
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
{'CVE-2018-3769'}
2022-03-03T05:13:20.669121Z
2018-08-13T20:45:32Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3769', 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af', 'https://github.com/ruby-grape/grape/issues/1762', 'https://github.com/ruby-grape/grape/pull/1763', 'https://github.com/advisories/GHSA-f599-5m7p-hcpf'}
null
RubyGems
GHSA-vqcm-7f7f-r539
brbackup exposes database password to unauthorized users
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.
{'CVE-2014-5004'}
2022-04-25T22:09:39Z
2018-03-05T19:32:06Z
HIGH
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2014/07/10/6', 'http://www.securityfocus.com/bid/68506', 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html', 'https://github.com/advisories/GHSA-vqcm-7f7f-r539', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
null
RubyGems
GHSA-jm35-h8q2-73mp
Improper one time password handling in devise-two-factor
### Impact As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval. ### Patches This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible. ### Credit for discovery Benoit Côté-Jodoin Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106
{'CVE-2021-43177'}
2022-04-19T18:30:18.696960Z
2022-04-07T22:09:03Z
MODERATE
null
null
{'https://github.com/tinfoil/devise-two-factor', 'https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43177', 'https://github.com/tinfoil/devise-two-factor/issues/106'}
null
RubyGems
GHSA-4ww3-3rxj-8v6q
High severity vulnerability that affects actionpack
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
{'CVE-2011-0449'}
2022-03-03T05:13:32.352787Z
2017-10-24T18:33:38Z
HIGH
null
null
{'http://secunia.com/advisories/43278', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449', 'http://www.vupen.com/english/advisories/2011/0877', 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'https://github.com/advisories/GHSA-4ww3-3rxj-8v6q', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://securitytracker.com/id?1025061'}
null
RubyGems
GHSA-5h5r-ffc4-c455
strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6.
{'CVE-2019-13354'}
2021-08-17T17:50:51Z
2019-07-08T20:32:35Z
CRITICAL
null
{'CWE-94'}
{'https://rubygems.org/gems/strong_password/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354', 'https://withatwist.dev/strong-password-rubygem-hijacked.html', 'https://github.com/bdmac/strong_password/releases', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'}
null
RubyGems
GHSA-xq52-rv6w-397c
Directive injection when using dynamic overrides with user input
### Impact If user-supplied input was passed into `append/override_content_security_policy_directives`, a semicolon could be injected leading to directive injection. This could be used to e.g. override a `script-src` directive. Duplicate directives are ignored and the first one wins. The directives in `secure_headers` are sorted alphabetically so they pretty much all come before `script-src`. A previously undefined directive would receive a value even if `SecureHeaders::OPT_OUT` was supplied. The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning when this happens. This will result in innocuous browser console messages if being exploited/accidentally used. In future releases, we will raise application errors resulting in 500s. > Duplicate script-src directives detected. All but the first instance will be ignored. See https://www.w3.org/TR/CSP3/#parse-serialized-policy > Note: In this case, the user agent SHOULD notify developers that a duplicate directive was ignored. A console warning might be appropriate, for example. ### Patches Depending on what major version you are using, the fixed versions are 6.2.0, 5.1.0, 3.8.0. ### Workarounds If you are passing user input into the above methods, you could filter out the input: ```ruby override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")]) ``` ### References Reported in https://github.com/twitter/secure_headers/issues/418 https://www.w3.org/TR/CSP3/#parse-serialized-policy ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repo](https://github.com/twitter/secure_headers/issues/new) * DM @ndm on twitter
{'CVE-2020-5217'}
2022-03-03T05:13:11.160362Z
2020-01-23T02:28:11Z
MODERATE
null
{'CWE-95'}
{'https://github.com/twitter/secure_headers/issues/418', 'https://github.com/twitter/secure_headers/commit/936a160e3e9659737a9f9eafce13eea36b5c9fa3', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5217', 'https://github.com/twitter/secure_headers/pull/421'}
null
RubyGems
GHSA-24fg-p96v-hxh8
Moderate severity vulnerability that affects rails
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
{'CVE-2011-0447'}
2022-03-03T05:13:50.651420Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-352'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html', 'http://www.vupen.com/english/advisories/2011/0877', 'http://www.debian.org/security/2011/dsa-2247', 'https://github.com/advisories/GHSA-24fg-p96v-hxh8', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447', 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails', 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain', 'http://www.securitytracker.com/id?1025060', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'http://secunia.com/advisories/43666', 'http://www.securityfocus.com/bid/46291', 'http://www.vupen.com/english/advisories/2011/0587', 'http://secunia.com/advisories/43274'}
null
RubyGems
GHSA-v3rr-cph9-2g2q
Moderate severity vulnerability that affects rack-ssl
Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
{'CVE-2014-2538'}
2022-03-03T05:13:09.421535Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html', 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b', 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538', 'http://www.securityfocus.com/bid/66314', 'https://github.com/advisories/GHSA-v3rr-cph9-2g2q', 'https://github.com/josh/rack-ssl', 'http://secunia.com/advisories/57466', 'http://www.openwall.com/lists/oss-security/2014/03/19/20'}
null
RubyGems
GHSA-2v5c-755p-p4gv
Missing TLS certificate verification in faye-websocket
The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `wss:` connection made using this library is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to. This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, [em-http-request][6] published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into [faye-websocket for Ruby][10], such that we use the `OpenSSL` module to perform two checks: - The chain of certificates presented by the server is valid and ultimately trusted by your root certificate set -- either your system default root certificates, or a set provided at runtime - The final certificate presented by the server is valid for the hostname used in the request URI; if the connection is made via a proxy we use the hostname from the request, not the proxy's hostname After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in faye-websocket, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either: - talking to the expected server, and will not break under this change - being attacked, and would benefit from being alerted to this fact - deliberately talking to a server that would be rejected by verification The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. To that end, we have added two new options to the `Faye::WebSocket::Client` constructor: `tls.root_cert_file`, and `tls.verify_peer`. The `:root_cert_file` option lets you provide a different set of root certificates in situations where you don't want to use your system's default root certificates to verify the remote host. It should be a path or an array of paths identifying the certificates to use instead of the defaults. ```rb client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: { root_cert_file: 'path/to/certificate.pem' }) ``` The `:verify_peer` option lets you turn verification off entirely. This should be a last resort and we recommend using the `:root_cert_file` option if possible. ```rb client = Faye::WebSocket::Client.new('wss://example.com/', [], tls: { verify_peer: false }) ``` To get the new behaviour, please upgrade to v0.11.0 of the [Rubygems package][10]. There are, unfortunately, no workarounds for this issue, as you cannot enable `:verify_peer` in EventMachine unless the calling library contains an implementation of `ssl_verify_peer` that actually checks the server's certificates. For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue. [1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls [2]: https://rubygems.org/gems/eventmachine [3]: https://github.com/eventmachine/eventmachine/issues/275 [4]: https://github.com/eventmachine/eventmachine/pull/378 [5]: https://github.com/eventmachine/eventmachine/issues/814 [6]: https://rubygems.org/gems/em-http-request [7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request [8]: https://github.com/igrigorik/em-http-request/pull/340 [9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer [10]: https://rubygems.org/gems/faye-websocket [12]: https://github.com/faye/faye/issues/524 [13]: https://github.com/faye/faye-websocket-ruby/pull/129 [14]: https://github.com/SpComb [15]: https://github.com/DanielMorsing
{'CVE-2020-15133'}
2022-03-03T05:13:15.785376Z
2020-07-31T17:40:04Z
HIGH
null
{'CWE-295'}
{'https://github.com/faye/faye/issues/524', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv', 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/eventmachine/eventmachine/pull/378', 'https://github.com/faye/faye-websocket-ruby'}
null
RubyGems
GHSA-q58g-455p-8vw9
In RubyGem excon, interrupted Persistent Connections May Leak Response Data
### Impact There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. ### Patches The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists). ### Workarounds Users can workaround the problem by disabling persistent connections, though this may cause performance implications. ### References See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details. ### For more information If you have any questions or comments about this advisory: * Open an issue in [excon/issues](https://github.com/excon/excon/issues) * Email us at [geemus+github@gmail.com](mailto:geemus+github@gmail.com)
{'CVE-2019-16779'}
2022-03-03T05:12:58.973224Z
2019-12-16T19:30:17Z
MODERATE
null
{'CWE-362', 'CWE-664'}
{'https://github.com/excon/excon', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779', 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html', 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}
null
RubyGems
GHSA-fr52-4hqw-p27f
Nokogiri does not forbid namespace nodes in XPointer ranges
xpointer.c in libxml2 before 2.9.5 (as used in nokogiri before 1.7.1 amongst other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
{'CVE-2016-4658'}
2022-04-26T18:33:06.257055Z
2018-08-21T19:03:26Z
CRITICAL
null
{'CWE-119'}
{'https://support.apple.com/HT207141', 'https://support.apple.com/HT207170', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4658', 'https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b', 'https://support.apple.com/HT207142', 'https://support.apple.com/HT207143', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html', 'https://security.gentoo.org/glsa/201701-37', 'https://github.com/advisories/GHSA-fr52-4hqw-p27f', 'http://www.securitytracker.com/id/1038623', 'http://www.securityfocus.com/bid/93054', 'http://www.securitytracker.com/id/1036858', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html', 'http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html'}
null
RubyGems
GHSA-685w-vc84-wxcx
Moderate severity vulnerability that affects doorkeeper
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
{'CVE-2014-8144'}
2022-03-03T05:13:33.937940Z
2018-09-17T21:55:22Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8144', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342', 'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-685w-vc84-wxcx', 'http://seclists.org/oss-sec/2014/q4/1076'}
null
RubyGems
GHSA-5hq2-xf89-9jxq
Open Redirect in Action Pack
Impact ------ This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Since rails/rails@9bc7ea5, strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, config.hosts << "sub.example.com" to permit a request with a Host header value of sub-example.com. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch put in an initializer can be used as a workaround. ```ruby class ActionDispatch::HostAuthorization::Permissions def sanitize_string(host) if host.start_with?(".") /\A(.+\.)?#{Regexp.escape(host[1..-1])}\z/i else /\A#{Regexp.escape host}\z/i end end end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-1-open-redirect.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks Jonathan Hefner (https://hackerone.com/jonathanhefner) for reporting this bug!
{'CVE-2021-22903'}
2022-03-03T05:13:40.829122Z
2021-05-05T19:48:29Z
MODERATE
null
{'CWE-601'}
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22903', 'https://hackerone.com/reports/1148025', 'https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867', 'https://groups.google.com/g/rubyonrails-security/c/8TxqXEtgSF0'}
null
RubyGems
GHSA-hj56-84jw-67h6
Potential Denial-of-Service in bindata
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
{'CVE-2021-32823'}
2022-03-03T05:13:23.518004Z
2021-06-23T23:42:04Z
LOW
null
{'CWE-400'}
{'https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency', 'https://github.com/dmendel/bindata/blob/master/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://rubygems.org/gems/bindata', 'https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323', 'https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-', 'https://github.com/rubysec/ruby-advisory-db/issues/476', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32823'}
null
RubyGems
GHSA-864j-6qpp-cmrr
SQL Injection in Geocoder
sql.rb in Geocoder before 1.6.1 allows Boolean-based SQL injection when within_bounding_box is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data.
{'CVE-2020-7981'}
2022-03-03T05:14:07.999518Z
2020-06-10T20:03:02Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/geocoder/CVE-2020-7981.yml', 'https://github.com/alexreisner/geocoder', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7981', 'https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1', 'https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7981'}
null
RubyGems
GHSA-wwh7-4jw9-33x6
High severity vulnerability that affects yajl-ruby
In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service.
{'CVE-2017-16516'}
2022-03-03T05:13:38.696890Z
2017-11-28T22:44:42Z
HIGH
null
{'CWE-134'}
{'https://github.com/brianmario/yajl-ruby', 'https://rubygems.org/gems/yajl-ruby', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516', 'https://github.com/advisories/GHSA-wwh7-4jw9-33x6', 'https://github.com/brianmario/yajl-ruby/issues/176', 'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html'}
null
RubyGems
GHSA-78vq-9j56-wrfr
Cross-site Scripting in gon
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
{'CVE-2020-25739'}
2022-03-03T05:13:59.881533Z
2021-04-30T17:29:15Z
MODERATE
null
{'CWE-79'}
{'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html', 'https://usn.ubuntu.com/4560-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}
null
RubyGems
GHSA-5r2p-j47h-mhpg
Moderate severity vulnerability that affects rack
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
{'CVE-2018-16471'}
2022-03-03T05:12:46.852569Z
2018-11-15T15:59:08Z
MODERATE
null
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'https://usn.ubuntu.com/4089-1/', 'https://github.com/advisories/GHSA-5r2p-j47h-mhpg', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16471'}
null
RubyGems
GHSA-j5hj-fhc9-g24m
Moderate severity vulnerability that affects rack-mini-profiler
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
{'CVE-2016-4442'}
2022-03-03T05:10:09.396301Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2016/06/10/2', 'https://github.com/MiniProfiler/rack-mini-profiler/', 'https://github.com/advisories/GHSA-j5hj-fhc9-g24m', 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c', 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}
null
RubyGems
GHSA-5vx5-9q73-wgp4
High severity vulnerability that affects safemode
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
{'CVE-2017-7540'}
2022-03-03T05:13:33.761900Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-184'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7540', 'https://github.com/svenfuchs/safemode/pull/23', 'https://github.com/advisories/GHSA-5vx5-9q73-wgp4'}
null
RubyGems
GHSA-8jxj-9r5f-w3m2
Low severity vulnerability that affects puppet
lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
{'CVE-2012-3866'}
2022-03-03T05:14:03.097740Z
2017-10-24T18:33:37Z
LOW
null
null
{'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866', 'https://github.com/advisories/GHSA-8jxj-9r5f-w3m2', 'http://www.debian.org/security/2012/dsa-2511', 'http://puppetlabs.com/security/cve/cve-2012-3866/', 'https://github.com/puppetlabs/puppet', 'http://secunia.com/advisories/50014', 'http://www.ubuntu.com/usn/USN-1506-1', 'https://bugzilla.redhat.com/show_bug.cgi?id=839135', 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}
null
RubyGems
GHSA-cr5j-953j-xw5p
Arbitrary execution of code in Nokogiri
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
{'CVE-2019-5477'}
2022-03-03T05:14:09.872205Z
2019-08-19T19:27:23Z
HIGH
null
{'CWE-78'}
{'https://hackerone.com/reports/650835', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477', 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc', 'https://security.gentoo.org/glsa/202006-05', 'https://github.com/sparklemotion/nokogiri/issues/1915', 'https://usn.ubuntu.com/4175-1/'}
null
RubyGems
GHSA-ww4x-rwq6-qpgf
Cross-site Request Forgery in OmniAuth
The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account. There is currently no fixed version of this package, however there is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284).
{'CVE-2015-9284'}
2022-03-03T05:13:17.254220Z
2019-05-29T19:11:31Z
HIGH
null
{'CWE-352'}
{'https://www.openwall.com/lists/oss-security/2015/05/26/11', 'https://github.com/omniauth/omniauth-rails/pull/1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284', 'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284', 'https://github.com/omniauth/omniauth/pull/809'}
null
RubyGems
GHSA-8fqx-7pv4-3jwm
Moderate severity vulnerability that affects rails
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
{'CVE-2008-7248'}
2022-03-03T05:13:33.636279Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/', 'http://www.vupen.com/english/advisories/2009/2544', 'http://secunia.com/advisories/36600', 'http://www.openwall.com/lists/oss-security/2009/11/28/1', 'http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1', 'https://github.com/advisories/GHSA-8fqx-7pv4-3jwm', 'http://www.openwall.com/lists/oss-security/2009/12/02/2', 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248', 'http://secunia.com/advisories/38915'}
null
RubyGems
GHSA-4f68-49qq-h392
Improper certificate validation in em-map
em-imap 0.5 and earlier use the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{'CVE-2020-13163'}
2022-03-03T05:13:33.057318Z
2021-05-24T18:12:20Z
MODERATE
null
{'CWE-295'}
{'https://securitylab.github.com/advisories/GHSL-2020-095-conradirwin-em-imap', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13163', 'https://github.com/ConradIrwin/em-imap/issues/25'}
null
RubyGems
GHSA-69p3-xp37-f692
Improper Certificate Validation in kubeclient
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby applications that leverage kubeclient to parse kubeconfig files are susceptible to Man-in-the-middle attacks (MITM).
{'CVE-2022-0759'}
2022-04-08T22:00:16.365711Z
2022-03-26T00:00:29Z
HIGH
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0759', 'https://github.com/ManageIQ/kubeclient/issues/554', 'https://github.com/ManageIQ/kubeclient/issues/555', 'https://github.com/ManageIQ/kubeclient/pull/556', 'https://github.com/ManageIQ/kubeclient'}
null
RubyGems
GHSA-h29f-7f56-j8wh
Moderate severity vulnerability that affects sinatra
An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash characters.
{'CVE-2018-7212'}
2022-03-03T05:12:59.959481Z
2018-02-20T19:23:20Z
MODERATE
null
{'CWE-22'}
{'https://github.com/sinatra/sinatra/commit/6ad721abcfe36334108dcdd05d046c361e1b7a9c', 'https://github.com/sinatra/sinatra/pull/1379', 'https://github.com/advisories/GHSA-h29f-7f56-j8wh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7212', 'https://github.com/sinatra/sinatra'}
null
RubyGems
GHSA-4g4c-8gqh-m4vm
Inclusion of Functionality from Untrusted Control Sphere in Ruby
The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5.
{'CVE-2019-13589'}
2021-05-10T22:18:28Z
2019-07-16T00:41:55Z
CRITICAL
null
{'CWE-829'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-13589', 'http://www.securityfocus.com/bid/109281', 'https://rubygems.org/gems/paranoid2/versions', 'https://github.com/rubygems/rubygems.org/issues/2051', 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600'}
null
RubyGems
GHSA-p692-7mm3-3fxg
actionpack is vulnerable to remote bypass authentication
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
{'CVE-2015-7576'}
2022-04-25T21:01:53.603216Z
2017-10-24T18:33:36Z
LOW
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7576', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/8', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://www.securityfocus.com/bid/81803', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'https://github.com/advisories/GHSA-p692-7mm3-3fxg', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ'}
null
RubyGems
GHSA-rvpq-5xqx-pfpp
High severity vulnerability that affects rails
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
{'CVE-2006-4111'}
2022-03-03T05:14:08.781707Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-94'}
{'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits', 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html', 'http://secunia.com/advisories/21466', 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html', 'http://www.vupen.com/english/advisories/2006/3237', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111', 'http://secunia.com/advisories/21749', 'http://www.securityfocus.com/bid/19454', 'http://securitytracker.com/id?1016673', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}
null
RubyGems
GHSA-2gw2-8q9w-cw8p
Ruby-ffi has a DLL loading issue
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.
{'CVE-2018-1000201'}
2022-04-26T18:33:00.711228Z
2018-08-31T14:55:43Z
HIGH
null
{'CWE-426'}
{'https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c', 'https://github.com/advisories/GHSA-2gw2-8q9w-cw8p', 'https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000201'}
null
RubyGems
GHSA-3q49-h8f9-9fr9
Missing TLS certificate verification
Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client. Those libraries both use the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid and trusted TLS certificate for the expected hostname. That means that any `https:` or `wss:` connection made using these libraries is vulnerable to a man-in-the-middle attack, since it does not confirm the identity of the server it is connected to. The first request a Faye client makes is always sent via normal HTTP, but later messages may be sent via WebSocket. Therefore it is vulnerable to the same problem that these underlying libraries are, and we needed both libraries to support TLS verification before Faye could claim to do the same. Your client would still be insecure if its initial HTTPS request was verified, but later WebSocket connections were not. This has been a requested feature in EventMachine for many years now; see for example [#275][3], [#378][4], and [#814][5]. In June 2020, em-http-request published an [advisory][7] related to this problem and fixed it by [implementing TLS verification][8] in their own codebase; although EventMachine does not implement certificate verification itself, it provides an extension point for the caller to implement it, called [`ssl_verify_peer`][9]. Based on this implementation, we have incorporated similar functionality into faye-websocket. After implementing verification in v1.1.6, em-http-request has elected to leave the `:verify_peer` option switched off by default. We have decided to _enable_ this option by default in Faye, but are publishing a minor release with added functionality for configuring it. We are mindful of the fact that this may break existing programs, but we consider it much more important that all clients have TLS verification turned on by default. A client that is not carrying out verification is either: - talking to the expected server, and will not break under this change - being attacked, and would benefit from being alerted to this fact - deliberately talking to a server that would be rejected by verification The latter case includes situations like talking to a non-public server using a self-signed certificate. We consider this use case to be "working by accident", rather than functionality that was actively supported, and it should be properly and explicitly supported instead. We are releasing Faye v1.4.0, which enables verification by default and provides a way to opt out of it: ```rb client = Faye::Client.new('https://example.com/', tls: { verify_peer: false }) ``` Unfortunately we can't offer an equivalent of the `:root_cert_file` option that has been added to faye-websocket, because em-http-request does not support it. If you need to talk to servers whose certificates are not recognised by your default root certificates, then you need to add its certificate (or another one that can verify it) to your system's root set. The same functionality is now supported in the Node.js version, with a `tls` option whose values will be passed to the `https` and `tls` modules as appropriate when making connections. For example, you can provide your own CA certificate: ```js var client = new faye.Client('https://example.com/', { tls: { ca: fs.readFileSync('path/to/certificate.pem') } }); ``` For further background information on this issue, please see [faye#524][12] and [faye-websocket#129][13]. We would like to thank [Tero Marttila][14] and [Daniel Morsing][15] for providing invaluable assistance and feedback on this issue. [1]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls [2]: https://rubygems.org/gems/eventmachine [3]: https://github.com/eventmachine/eventmachine/issues/275 [4]: https://github.com/eventmachine/eventmachine/pull/378 [5]: https://github.com/eventmachine/eventmachine/issues/814 [6]: https://rubygems.org/gems/em-http-request [7]: https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request [8]: https://github.com/igrigorik/em-http-request/pull/340 [9]: https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer [10]: https://rubygems.org/gems/faye-websocket [11]: https://faye.jcoglan.com/ [12]: https://github.com/faye/faye/issues/524 [13]: https://github.com/faye/faye-websocket-ruby/pull/129 [14]: https://github.com/SpComb [15]: https://github.com/DanielMorsing
{'CVE-2020-15134'}
2022-03-03T05:13:02.251112Z
2020-07-31T17:39:42Z
HIGH
null
{'CWE-295'}
{'https://github.com/faye/faye/issues/524', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:start_tls', 'https://github.com/igrigorik/em-http-request/pull/340', 'https://github.com/faye/faye-websocket-ruby/pull/129', 'https://blog.jcoglan.com/2020/07/31/missing-tls-verification-in-faye/', 'https://github.com/eventmachine/eventmachine/issues/814', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134', 'https://securitylab.github.com/advisories/GHSL-2020-094-igrigorik-em-http-request', 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9', 'https://www.rubydoc.info/github/eventmachine/eventmachine/EventMachine/Connection:ssl_verify_peer', 'https://github.com/eventmachine/eventmachine/issues/275', 'https://github.com/eventmachine/eventmachine/pull/378'}
null
RubyGems
GHSA-j6w9-fv6q-3q52
Percent-encoded cookies can be used to overwrite existing prefixed cookie names
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
{'CVE-2020-8184'}
2022-03-03T05:14:04.623248Z
2020-06-24T17:15:00Z
HIGH
null
{'CWE-784'}
{'https://groups.google.com/g/rubyonrails-security/c/OWtmozPH9Ak', 'https://hackerone.com/reports/895727', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2020-8184.yml', 'https://github.com/rack/rack/commit/1f5763de6a9fe515ff84992b343d63c88104654c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8184', 'https://usn.ubuntu.com/4561-1/', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html'}
null
RubyGems
GHSA-6x46-7rrv-m4h8
Low severity vulnerability that affects sqlite3-ruby
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
{'CVE-2011-0995'}
2022-03-03T05:14:14.300643Z
2017-10-24T18:33:38Z
LOW
null
null
{'http://support.novell.com/security/cve/CVE-2011-0995.html', 'http://secunia.com/advisories/44418', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995', 'http://www.osvdb.org/72180', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263', 'https://bugzilla.novell.com/show_bug.cgi?id=685928', 'http://www.securityfocus.com/bid/47694', 'https://github.com/advisories/GHSA-6x46-7rrv-m4h8'}
null
RubyGems
GHSA-mh37-8c3g-3fgc
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
{'CVE-2019-8322'}
2022-03-03T05:14:20.730554Z
2019-06-20T16:06:00Z
HIGH
null
null
{'https://hackerone.com/reports/315087', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
null
RubyGems
GHSA-jwhv-rgqc-fqj5
Moderate severity vulnerability that affects rails
Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
{'CVE-2007-5380'}
2022-03-03T05:14:05.282733Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-384'}
{'http://security.gentoo.org/glsa/glsa-200711-17.xml', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html', 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html', 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5', 'http://www.novell.com/linux/security/advisories/2007_25_sr.html', 'http://www.vupen.com/english/advisories/2007/3508', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'http://www.securityfocus.com/bid/26096', 'http://docs.info.apple.com/article.html?artnum=307179', 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380', 'https://github.com/rails/rails', 'http://secunia.com/advisories/28136', 'http://secunia.com/advisories/27965', 'http://secunia.com/advisories/27657', 'http://www.vupen.com/english/advisories/2007/4238'}
null
RubyGems
GHSA-gwrj-88fp-5m36
Code injection in Narou
Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel.
{'CVE-2021-35514'}
2022-03-03T05:13:07.602213Z
2021-07-02T18:36:01Z
HIGH
null
{'CWE-94'}
{'https://vuln.ryotak.me/advisories/51', 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42', 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514'}
null
RubyGems
GHSA-4936-rj25-6wm6
High severity vulnerability that affects nori
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-0285'}
2022-03-03T05:14:19.397843Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285', 'https://github.com/advisories/GHSA-4936-rj25-6wm6', 'http://seclists.org/oss-sec/2013/q1/304'}
null
RubyGems
GHSA-c6qr-h5vq-59jc
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production. This vulnerability has been assigned the CVE identifier CVE-2020-8185. Versions Affected: 6.0.0 < rails < 6.0.3.2 Not affected: Applications with `config.action_dispatch.show_exceptions = false` (this is not a default setting in production) Fixed Versions: rails >= 6.0.3.2 Impact ------ Using this issue, an attacker would be able to execute any migrations that are pending for a Rails app running in production mode. It is important to note that an attacker is limited to running migrations the application developer has already defined in their application and ones that have not already ran. Workarounds ----------- Until such time as the patch can be applied, application developers should disable the ActionDispatch middleware in their production environment via a line such as this one in their config/environment/production.rb: `config.middleware.delete ActionDispatch::ActionableExceptions`
{'CVE-2020-8185'}
2022-03-03T05:14:11.823792Z
2020-06-24T17:40:33Z
MODERATE
null
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://hackerone.com/reports/899069', 'https://groups.google.com/g/rubyonrails-security/c/pAe9EV8gbM0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8185', 'https://github.com/rails/rails/commit/2121b9d20b60ed503aa041ef7b926d331ed79fc2', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8185.yml'}
null
RubyGems
GHSA-p4x4-rw2p-8j8m
Cross-site Scripting in Sanitize
When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows certain elements, some content in a `<math>` or `<svg>` element may not be sanitized correctly even if `math` and `svg` are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: - `iframe` - `math` - `noembed` - `noframes` - `noscript` - `plaintext` - `script` - `style` - `svg` - `xmp` ### Impact Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. ### Releases This problem has been fixed in Sanitize 5.2.1. ### Workarounds If upgrading is not possible, a workaround is to override the default value of Sanitize's `:remove_contents` config option with the following value, which ensures that the contents of `math` and `svg` elements (among others) are removed entirely when those elements are not in the allowlist: ```ruby %w[iframe math noembed noframes noscript plaintext script style svg xmp] ``` For example, if you currently use Sanitize's relaxed config, you can create a custom config object that overrides the default value of `:remove_contents` like this: ```ruby custom_config = Sanitize::Config.merge( Sanitize::Config::RELAXED, :remove_contents => %w[iframe math noembed noframes noscript plaintext script style svg xmp] ) ``` You would then pass this custom config to Sanitize when sanitizing HTML. ### For more information If you have any questions or comments about this advisory: - Open an issue in the [Sanitize repo](https://github.com/rgrove/sanitize). - See Sanitize's [security policy](https://github.com/rgrove/sanitize/security/policy). ### Credits Many thanks to Michal Bentkowski of Securitum for reporting this bug and helping to verify the fix. ### References - [GHSA-p4x4-rw2p-8j8m](https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m) - [CVE-2020-4054](https://nvd.nist.gov/vuln/detail/CVE-2020-4054) - https://github.com/rgrove/sanitize/releases/tag/v5.2.1
{'CVE-2020-4054'}
2022-03-03T05:13:26.390326Z
2020-06-16T22:08:06Z
HIGH
null
{'CWE-79'}
{'https://github.com/rgrove/sanitize/releases/tag/v5.2.1', 'https://usn.ubuntu.com/4543-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4054', 'https://github.com/rgrove/sanitize/commit/a11498de9e283cd457b35ee252983662f7452aa9', 'https://github.com/rgrove/sanitize/security/advisories/GHSA-p4x4-rw2p-8j8m', 'https://www.debian.org/security/2020/dsa-4730'}
null
RubyGems
GHSA-rprj-g6xc-p5gq
Moderate severity vulnerability that affects wicked
Directory traversal vulnerability in controller/concerns/render_redirect.rb in the Wicked gem before 1.0.1 for Ruby allows remote attackers to read arbitrary files via a %2E%2E%2F (encoded dot dot slash) in the step.
{'CVE-2013-4413'}
2022-03-03T05:14:13.648715Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-22'}
{'http://www.securityfocus.com/bid/62891', 'http://secunia.com/advisories/55151', 'https://github.com/schneems/wicked', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413', 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq', 'http://seclists.org/oss-sec/2013/q4/43', 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}
null
RubyGems
GHSA-wg9m-gw3h-hg83
Injection in field_test
The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).
{'CVE-2019-13146'}
2021-05-11T14:27:51Z
2019-07-16T00:42:27Z
MODERATE
null
{'CWE-74'}
{'http://www.securityfocus.com/bid/109114', 'https://rubygems.org/gems/field_test', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13146', 'https://github.com/ankane/field_test/issues/17'}
null
RubyGems
GHSA-qphc-hf5q-v8fc
Open Redirect in actionpack
Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: ``` config.hosts << '.EXAMPLE.com' ``` When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. This vulnerability is similar to CVE-2021-22881 and CVE-2021-22942. Releases -------- The fixed releases are available at the normal locations. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 6-0-host-authorzation-open-redirect.patch - Patch for 6.0 series * 6-1-host-authorzation-open-redirect.patch - Patch for 6.1 series * 7-0-host-authorzation-open-redirect.patch - Patch for 7.0 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
{'CVE-2021-44528'}
2022-04-27T22:32:00.332117Z
2021-12-14T21:19:08Z
MODERATE
null
{'CWE-601'}
{'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ', 'https://github.com/rails/rails/blob/v6.1.4.2/actionpack/CHANGELOG.md#rails-6142-december-14-2021', 'https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44528', 'https://groups.google.com/g/ruby-security-ann/c/vG9gz3nk1pM/m/7-NU4MNrDAAJ?utm_medium=email&utm_source=footer', 'https://github.com/rails/rails', 'https://github.com/rails/rails/commit/aecba3c301b80e9d5a63c30ea1b287bceaf2c107', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-44528.yml'}
null
RubyGems
GHSA-hgmw-x865-hf9x
High severity vulnerability that affects arabic-prawn
lib/string_utf_support.rb in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.
{'CVE-2014-2322'}
2022-03-07T20:48:01.952688Z
2017-10-24T18:33:36Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2014-2322', 'https://github.com/ozeron/prawn-arabic', 'http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html', 'http://www.openwall.com/lists/oss-security/2014/03/12/6', 'https://github.com/advisories/GHSA-hgmw-x865-hf9x', 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}
null
RubyGems
GHSA-r5hc-9xx5-97rw
Moderate severity vulnerability that affects i18n
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
{'CVE-2013-4492'}
2022-03-03T05:13:54.902315Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/64076', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492', 'http://www.debian.org/security/2013/dsa-2830', 'https://github.com/svenfuchs/i18n', 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ', 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}
null
RubyGems
GHSA-j858-xp5v-f8xx
Remote code execution in Dragonfly
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{'CVE-2021-33564'}
2022-03-03T05:13:58.950700Z
2021-06-02T21:42:49Z
CRITICAL
null
{'CWE-94', 'CWE-88'}
{'https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/', 'https://github.com/mlr0p/CVE-2021-33564', 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml', 'https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5', 'https://github.com/markevans/dragonfly/issues/513', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33564', 'https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0'}
null
RubyGems
GHSA-844m-cpr9-jcmh
Secure/signed cookies share secrets between sites in a multi-site application
### Impact This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. ### Patches The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
{'CVE-2021-41263'}
2022-03-03T05:12:57.242829Z
2021-11-15T17:54:01Z
MODERATE
null
{'CWE-200', 'CWE-565'}
{'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263', 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh', 'https://github.com/discourse/rails_multisite'}
null
RubyGems
GHSA-25f5-gc4h-hc22
Improper Privilege Management in devise_masquerade
The devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of security protection compared to a situation where Devise (without this extension) is used. If the server-side secret_key_base value became publicly known (for instance if it is committed to a public repository by mistake), there are still other protections in place that prevent an attacker from impersonating any user on the site. When masquerading is not used in a plain Devise application, one must know the password salt of the target user if one wants to encrypt and sign a valid session cookie. When devise_masquerade is used, however, an attacker can decide which user the "back" action will go back to without knowing that user's password salt and simply knowing the user ID, by manipulating the session cookie and pretending that a user is already masqueraded by an administrator.
{'CVE-2021-28680'}
2022-03-03T05:14:04.409248Z
2021-12-08T19:55:30Z
HIGH
null
{'CWE-269'}
{'https://github.com/oivoodoo/devise_masquerade/releases/tag/v1.3.1', 'https://github.com/oivoodoo/devise_masquerade/pull/76', 'https://github.com/oivoodoo/devise_masquerade', 'https://github.com/oivoodoo/devise_masquerade/issues/83', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28680', 'https://labanskoller.se/blog/2021/03/23/the-devise-extension-that-peeled-off-one-layer-of-the-security-onion-cve-2021-28680/'}
null
RubyGems
GHSA-5v3f-73gv-x7x5
cairo is vulnerable to denial of service due to a null pointer dereference
Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
{'CVE-2017-7475'}
2022-04-25T20:55:52Z
2017-11-15T20:41:14Z
MODERATE
null
{'CWE-476'}
{'https://github.com/advisories/GHSA-5v3f-73gv-x7x5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475', 'https://bugs.freedesktop.org/show_bug.cgi?id=100763', 'http://seclists.org/oss-sec/2017/q2/151', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}
null
RubyGems
GHSA-9h6g-gp95-x3q5
actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
{'CVE-2015-7581'}
2022-04-25T21:01:52.994027Z
2017-10-24T18:33:36Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7581', 'http://www.securityfocus.com/bid/81677', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/16', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'https://github.com/advisories/GHSA-9h6g-gp95-x3q5', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.securitytracker.com/id/1034816', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ'}
null
RubyGems
GHSA-5pm8-492c-92p5
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ## Recommendation Upgrade to version 3.2.0 or later.
{'CVE-2019-18841'}
2022-03-03T05:12:51.639263Z
2019-12-02T18:04:11Z
HIGH
null
null
{'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md', 'https://github.com/ankane/chartkick.js/issues/117', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://www.npmjs.com/advisories/1312', 'https://github.com/ankane/chartkick/commits/master', 'https://rubygems.org/gems/chartkick/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://chartkick.com'}
null
RubyGems
GHSA-699m-mcjm-9cw8
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/translation_helper.rb in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
{'CVE-2013-4491'}
2022-03-03T05:13:15.739975Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/64076', 'http://rhn.redhat.com/errata/RHSA-2013-1794.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html', 'https://puppet.com/security/cve/cve-2013-4491', 'http://secunia.com/advisories/57836', 'https://github.com/advisories/GHSA-699m-mcjm-9cw8', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html', 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491', 'http://rhn.redhat.com/errata/RHSA-2014-0008.html', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html', 'http://www.debian.org/security/2014/dsa-2888', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://rhn.redhat.com/errata/RHSA-2014-1863.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ'}
null
RubyGems
GHSA-r7j3-vvh2-xrpj
OS Command Injection in MiniMagick
In lib/mini_magick/image.rb in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because Image.open input is directly passed to Kernel#open, which accepts a '|' character followed by a command.
{'CVE-2019-13574'}
2022-03-03T05:13:10.705994Z
2019-07-18T13:19:22Z
HIGH
null
{'CWE-78'}
{'https://www.debian.org/security/2019/dsa-4481', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574', 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html', 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4', 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb', 'https://seclists.org/bugtraq/2019/Jul/20', 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/'}
null
RubyGems
GHSA-534w-937m-v7x3
High severity vulnerability that affects restforce
A flaw in how restforce constructs URLs may allow an attacker to inject additional parameters into Salesforce API requests. Impact ------ This flaw is only exploitable in applications that pass user input directly to restforce's select, find, describe, update, upsert, and destroy methods. Vulnerable code might look like: ```ruby client.select('SomeSalesForceObject', params[:some-id], ...) ``` In such an application, attackers could pass `0016000000MRatd/describe` as a request parameter, causing the server to make a request to a different endpoint than the server is designed to handle. Since the Salesforce REST API supports overriding HTTP methods via a request parameter, an attacker could also cause the client's `select()` method to modify data, by passing `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`. Workarounds ------ If possible, applications should track salesforce IDs internally, rather than passing user-supplied IDs to salesforce. Such practice mitigates this vulnerability, and in general is desirable for ensuring strong access control.
{'CVE-2018-3777'}
2022-03-03T05:13:39.195821Z
2018-08-03T21:04:02Z
HIGH
null
{'CWE-20'}
{'https://github.com/restforce/restforce/pull/392', 'https://github.com/advisories/GHSA-534w-937m-v7x3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3777'}
null
RubyGems
GHSA-x7p2-x2j6-mwhr
Moderate severity vulnerability that affects gemirro
Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
{'CVE-2017-16833'}
2022-03-03T05:13:32.757913Z
2017-11-29T23:19:51Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PierreRambaud/gemirro', 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de', 'https://github.com/advisories/GHSA-x7p2-x2j6-mwhr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}
null
RubyGems
GHSA-76wq-xw4h-f8wj
High severity vulnerability that affects activerecord
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
{'CVE-2012-2695'}
2022-03-03T05:13:37.613632Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-89'}
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://github.com/advisories/GHSA-76wq-xw4h-f8wj', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}
null
RubyGems
GHSA-73qw-ww62-m54x
Critical severity vulnerability that affects colorscore
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
{'CVE-2015-7541'}
2022-03-03T05:12:47.605634Z
2017-10-24T18:33:36Z
CRITICAL
null
{'CWE-77'}
{'http://rubysec.com/advisories/CVE-2015-7541/', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541', 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}
null
RubyGems
GHSA-jmm9-2p29-vh2w
High severity vulnerability that affects activerecord
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
{'CVE-2011-0448'}
2022-03-03T05:14:10.987481Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-89'}
{'http://secunia.com/advisories/43278', 'http://securitytracker.com/id?1025063', 'http://www.vupen.com/english/advisories/2011/0877', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'https://github.com/advisories/GHSA-jmm9-2p29-vh2w', 'https://github.com/rails/rails', 'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain'}
null
RubyGems
GHSA-2xjj-5x6h-8vmf
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
{'CVE-2012-1099'}
2022-03-03T05:13:12.679378Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=799276', 'http://www.debian.org/security/2012/dsa-2466', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html', 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099', 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}
null
RubyGems
GHSA-pchc-949f-53m5
High severity vulnerability that affects multi_xml
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-0175'}
2022-03-03T05:13:26.469460Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175', 'https://news.ycombinator.com/item?id=5040457', 'https://github.com/sferik/multi_xml', 'https://github.com/sferik/multi_xml/pull/34', 'https://gist.github.com/nate/d7f6d9f4925f413621aa', 'http://www.openwall.com/lists/oss-security/2013/01/11/9', 'https://github.com/advisories/GHSA-pchc-949f-53m5'}
null
RubyGems
GHSA-vxvp-4xwc-jpp6
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
{'CVE-2015-3226'}
2022-03-03T05:12:47.891996Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'http://www.securitytracker.com/id/1033755', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ', 'http://openwall.com/lists/oss-security/2015/06/16/17', 'http://www.securityfocus.com/bid/75231', 'https://github.com/advisories/GHSA-vxvp-4xwc-jpp6', 'http://www.debian.org/security/2016/dsa-3464', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}
null
RubyGems
GHSA-fh39-v733-mxfr
Moderate severity vulnerability that affects activerecord
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
{'CVE-2012-2661'}
2022-03-03T05:13:01.957838Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2012-2661', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://github.com/advisories/GHSA-fh39-v733-mxfr', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
RubyGems
GHSA-5m2v-hc64-56h6
A crafted ZIP file can cause a denial of service in Rubyzip
In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).
{'CVE-2019-16892'}
2022-03-03T05:13:01.977335Z
2019-09-30T16:05:32Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16892', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/', 'https://access.redhat.com/errata/RHBA-2019:4047', 'https://github.com/jdleesmiller/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/', 'https://github.com/rubyzip/rubyzip/pull/403', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/', 'https://access.redhat.com/errata/RHSA-2019:4201'}
null
RubyGems
GHSA-q3wr-qw3g-3p4h
Injection/XSS in Redcarpet
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
{'CVE-2020-26298'}
2022-03-03T05:13:23.703389Z
2021-01-11T19:06:10Z
MODERATE
null
{'CWE-79'}
{'https://www.debian.org/security/2021/dsa-4831', 'https://rubygems.org/gems/redcarpet', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00014.html', 'https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security', 'https://github.com/advisories/GHSA-q3wr-qw3g-3p4h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26298'}
null
RubyGems
GHSA-26xx-m4q2-xhq8
Authentication Bypass by CSRF Weakness
### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch 👏 ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 Spree 4.1 users should update to spree_auth_devise 4.1.1 Older Spree version users should update to spree_auth_devise 4.0.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
{'CVE-2021-41275'}
2022-03-03T05:12:54.592023Z
2021-11-18T20:14:19Z
CRITICAL
null
{'CWE-352'}
{'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-26xx-m4q2-xhq8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275', 'https://github.com/spree/spree_auth_devise', 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-g4xq-jx4w-4cjv
Moderate severity vulnerability that affects loofah
In the Loofah gem for Ruby, through version 2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. Users are advised to upgrade to version 2.2.3. See https://github.com/flavorjones/loofah/issues/154 for more details.
{'CVE-2018-16468'}
2022-03-03T05:13:37.053955Z
2018-11-01T14:46:01Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-g4xq-jx4w-4cjv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16468', 'https://www.debian.org/security/2019/dsa-4364', 'https://github.com/flavorjones/loofah/issues/154'}
null
RubyGems
GHSA-9h36-4jf2-hx53
High severity vulnerability that affects extlib
The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1802'}
2022-03-03T05:13:47.352463Z
2017-10-24T18:33:37Z
HIGH
null
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=917233', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802', 'https://github.com/advisories/GHSA-9h36-4jf2-hx53', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html', 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}
null
RubyGems
GHSA-gjxw-5w2q-7grf
Moderate severity vulnerability that affects rails
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
{'CVE-2010-3933'}
2022-03-03T05:13:52.955482Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'http://securitytracker.com/id?1024624', 'https://github.com/advisories/GHSA-gjxw-5w2q-7grf', 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0', 'http://www.vupen.com/english/advisories/2010/2719', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933', 'http://secunia.com/advisories/41930'}
null
RubyGems
GHSA-j24p-r6wx-r79w
High severity vulnerability that affects thin
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
{'CVE-2009-3287'}
2022-03-03T05:13:18.776632Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2009-3287', 'http://github.com/macournoyer/thin', 'http://github.com/macournoyer/thin/blob/master/CHANGELOG', 'https://github.com/advisories/GHSA-j24p-r6wx-r79w', 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a', 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}
null
RubyGems
GHSA-x7jg-6pwg-fx5h
HTTP Smuggling via Transfer-Encoding Header in Puma
### Impact By using an invalid transfer-encoding header, an attacker could [smuggle an HTTP response.](https://portswigger.net/web-security/request-smuggling) Originally reported by @ZeddYu, who has our thanks for the detailed report. ### Patches The problem has been fixed in Puma 3.12.5 and Puma 4.3.4. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2020-11076'}
2022-03-03T05:13:40.798691Z
2020-05-22T14:55:05Z
HIGH
null
{'CWE-444'}
{'https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h', 'https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SKIY5H67GJIGJL6SMFWFLUQQQR3EMVPR/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00009.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11076', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00034.html', 'https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22'}
null
RubyGems
GHSA-jphg-qwrw-7w9g
Unsafe object creation in json RubyGem
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
{'CVE-2020-10663'}
2022-03-03T05:12:49.265606Z
2020-07-27T18:08:21Z
HIGH
null
{'CWE-20'}
{'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4721', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/', 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/', 'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://support.apple.com/kb/HT211931', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'http://seclists.org/fulldisclosure/2020/Dec/32', 'https://github.com/flori/json', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2020-10663.yml', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html', 'https://security.netapp.com/advisory/ntap-20210129-0003/', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663', 'https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E'}
null
RubyGems
GHSA-vqqv-v9m2-48p2
Critical severity vulnerability that affects bootstrap-sass
Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.
{'CVE-2019-10842'}
2021-09-20T22:15:48Z
2019-04-04T16:28:47Z
CRITICAL
null
{'CWE-94'}
{'http://dgb.github.io/2019/04/05/bootstrap-sass-backdoor.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10842', 'https://github.com/twbs/bootstrap-sass/issues/1195', 'https://github.com/twbs/bootstrap-sass', 'https://snyk.io/vuln/SNYK-RUBY-BOOTSTRAPSASS-174093', 'https://github.com/advisories/GHSA-vqqv-v9m2-48p2', 'https://snyk.io/blog/malicious-remote-code-execution-backdoor-discovered-in-the-popular-bootstrap-sass-ruby-gem/'}
null
RubyGems
GHSA-qp49-3pvw-x4m5
sinatra does not validate expanded path matches
Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
{'CVE-2022-29970'}
2022-05-03T21:02:03.543510Z
2022-05-03T00:00:43Z
MODERATE
null
{'CWE-426'}
{'https://github.com/skylightio/skylight-ruby/pull/294', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29970', 'https://github.com/sinatra/sinatra/', 'https://github.com/sinatra/sinatra/pull/1683/commits/462c3ca1db53ed3cfc394cf5948e9c948ad1c10e'}
null