ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
RubyGems
GHSA-hwhh-2fwm-cfgw
Doorkeeper is vulnerable to stored XSS and code execution
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
{'CVE-2018-1000088'}
2022-04-26T17:46:52.416570Z
2018-03-13T20:44:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/doorkeeper-gem/doorkeeper/issues/969', 'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/rubysec/ruby-advisory-db/pull/328/files', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088', 'https://github.com/doorkeeper-gem/doorkeeper/pull/970', 'https://github.com/advisories/GHSA-hwhh-2fwm-cfgw'}
null
RubyGems
GHSA-v6fx-752r-ccp2
CSRF on PgHero gem
The PgHero gem through 2.6.0 for Ruby allows CSRF.
{'CVE-2020-16253'}
2022-03-03T05:13:14.287515Z
2020-08-05T14:53:43Z
HIGH
null
{'CWE-352'}
{'https://github.com/ankane/pghero', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero/', 'https://github.com/ankane/pghero/issues/330', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}
null
RubyGems
GHSA-xjqg-9jvg-fgx2
High severity vulnerability that affects nokogiri
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
{'CVE-2015-5312'}
2022-03-03T05:13:37.789725Z
2018-08-21T19:03:04Z
HIGH
null
null
{'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://support.apple.com/HT206166', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312', 'http://www.debian.org/security/2015/dsa-3430', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e', 'http://www.ubuntu.com/usn/USN-2834-1', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://xmlsoft.org/news.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://support.apple.com/HT206167', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206169', 'http://www.securitytracker.com/id/1034243', 'https://github.com/advisories/GHSA-xjqg-9jvg-fgx2', 'https://support.apple.com/HT206168', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'http://www.securityfocus.com/bid/79536', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693', 'https://security.gentoo.org/glsa/201701-37', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}
null
RubyGems
GHSA-76wm-422q-92mq
Code injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
{'CVE-2019-8324'}
2022-03-03T05:13:39.303080Z
2019-06-20T16:06:11Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8324', 'https://access.redhat.com/errata/RHSA-2019:1972', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://hackerone.com/reports/328571'}
null
RubyGems
GHSA-7hp2-xwpj-95jq
Nokogiri, dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash)
dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.
{'CVE-2015-8806'}
2022-04-26T18:48:01.838715Z
2018-09-17T21:53:42Z
HIGH
null
{'CWE-125'}
{'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'https://github.com/advisories/GHSA-7hp2-xwpj-95jq', 'https://www.debian.org/security/2016/dsa-3593', 'https://bugzilla.gnome.org/show_bug.cgi?id=749115', 'http://www.ubuntu.com/usn/USN-2994-1', 'http://www.securityfocus.com/bid/82071', 'https://security.gentoo.org/glsa/201701-37', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806', 'http://www.openwall.com/lists/oss-security/2016/02/03/5'}
null
RubyGems
GHSA-h6w6-xmqv-7q78
High severity vulnerability that affects activerecord
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
{'CVE-2011-2930'}
2022-03-03T05:14:21.566569Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-89'}
{'https://github.com/advisories/GHSA-h6w6-xmqv-7q78', 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=731438', 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}
null
RubyGems
GHSA-fxwv-953p-7qpf
Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
{'CVE-2015-7519'}
2022-04-26T18:33:06.194040Z
2018-10-10T17:29:13Z
LOW
null
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'https://bugzilla.suse.com/show_bug.cgi?id=956281', 'https://github.com/phusion/passenger', 'https://puppet.com/security/cve/passenger-dec-2015-security-fixes', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://github.com/advisories/GHSA-fxwv-953p-7qpf', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html', 'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7519', 'http://www.openwall.com/lists/oss-security/2015/12/07/2'}
null
RubyGems
GHSA-8r6h-7x9g-xmw9
Moderate severity vulnerability that affects will_paginate
Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.
{'CVE-2013-6459'}
2022-03-03T05:14:19.548643Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mislav/will_paginate/releases/tag/v3.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459', 'https://github.com/advisories/GHSA-8r6h-7x9g-xmw9', 'http://www.securityfocus.com/bid/64509', 'https://access.redhat.com/errata/RHSA-2018:0336', 'http://secunia.com/advisories/56180'}
null
RubyGems
GHSA-jj47-x69x-mxrm
Buffer Overflow in yajl-ruby
yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library. The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. ### Details The [reallocation logic at yajl_buf.c#L64](https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64) may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. ### Impact We rate this as a moderate severity vulnerability which mostly impacts process availability as we believe exploitation for arbitrary code execution to be unlikely. ### Patches Patched in yajl-ruby 1.4.2 ### Workarounds Avoid passing large inputs to YAJL ### References https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64 ### For more information If you have any questions or comments about this advisory: * Open an issue in [yajl-ruby](https://github.com/brianmario/yajl-ruby/issues)
{'CVE-2022-24795'}
2022-04-06T21:16:57.159918Z
2022-04-05T15:55:51Z
MODERATE
null
{'CWE-190', 'CWE-122'}
{'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64', 'https://github.com/brianmario/yajl-ruby', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24795', 'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm'}
null
RubyGems
GHSA-w37c-q653-qg95
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in the simple_format helper in actionpack/lib/action_view/helpers/text_helper.rb in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute.
{'CVE-2013-6416'}
2022-03-03T05:13:00.001966Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/5ZI1-H5OoIM/ZNq4FoR2GnIJ', 'http://www.securityfocus.com/bid/64071', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416', 'https://github.com/rails/rails', 'https://github.com/advisories/GHSA-w37c-q653-qg95'}
null
RubyGems
GHSA-2rqw-v265-jf8c
Open Redirect in ActionPack
# Overview There is a possible open redirect vulnerability in the Host Authorization middleware in Action Pack. This vulnerability has been assigned the CVE identifier CVE-2021-22942. Versions Affected: >= 6.0.0. Not affected: < 6.0.0 Fixed Versions: 6.1.4.1, 6.0.4.1 # Impact Specially crafted “X-Forwarded-Host” headers in combination with certain “allowed host” formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this: ```ruby config.hosts << '.EXAMPLE.com' ``` When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website. This vulnerability is similar to CVE-2021-22881, but CVE-2021-22881 did not take in to account domain name case sensitivity. # Releases The fixed releases are available at the normal locations. # Workarounds In the case a patch can’t be applied, the following monkey patch can be used in an initializer: ```ruby module ActionDispatch class HostAuthorization HOSTNAME = /[a-z0-9.-]+|\[[a-f0-9]*:[a-f0-9.:]+\]/i VALID_ORIGIN_HOST = /\A(#{HOSTNAME})(?::\d+)?\z/ VALID_FORWARDED_HOST = /(?:\A|,[ ]?)(#{HOSTNAME})(?::\d+)?\z/ private def authorized?(request) origin_host = request.get_header("HTTP_HOST")&.slice(VALID_ORIGIN_HOST, 1) || "" forwarded_host = request.x_forwarded_host&.slice(VALID_FORWARDED_HOST, 1) || "" @permissions.allows?(origin_host) && (forwarded_host.blank? || @permissions.allows?(forwarded_host)) end end end ```
{'CVE-2021-22942'}
2022-03-03T05:13:45.147448Z
2021-08-26T20:36:51Z
HIGH
null
{'CWE-601'}
{'http://www.openwall.com/lists/oss-security/2021/12/14/5', 'https://rubygems.org/gems/actionpack', 'https://groups.google.com/g/rubyonrails-security/c/wB5tRn7h36c', 'https://access.redhat.com/security/cve/cve-2021-22942', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22942', 'https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22942.yml'}
null
RubyGems
GHSA-c3gv-9cxf-6f57
Cross-site Scripting in Loofah
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
{'CVE-2019-15587'}
2022-03-03T05:11:52.904209Z
2019-11-05T23:58:25Z
LOW
null
{'CWE-79'}
{'https://usn.ubuntu.com/4498-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15587', 'https://hackerone.com/reports/709009', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'https://www.debian.org/security/2019/dsa-4554', 'https://github.com/flavorjones/loofah/issues/171'}
null
RubyGems
GHSA-v5jg-558j-q67c
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
{'CVE-2011-2931'}
2022-03-03T05:13:59.190408Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/advisories/GHSA-v5jg-558j-q67c', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731436', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931', 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'https://github.com/rails/rails', 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}
null
RubyGems
GHSA-jmgf-p46x-982h
Moderate severity vulnerability that affects rails
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
{'CVE-2008-5189'}
2022-03-03T05:13:26.680367Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-352'}
{'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d', 'http://www.securityfocus.com/bid/32359', 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189', 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing', 'https://github.com/advisories/GHSA-jmgf-p46x-982h', 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk', 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://github.com/rails/rails'}
null
RubyGems
GHSA-pxr8-w3jq-rcwj
Moderate severity vulnerability that affects rails_admin
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
{'CVE-2017-12098'}
2022-03-03T05:13:37.032009Z
2018-03-05T19:37:23Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450', 'http://www.securityfocus.com/bid/102486'}
null
RubyGems
GHSA-9fh3-vh3h-q4g3
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
{'CVE-2011-2932'}
2022-03-03T05:12:38.166203Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=731435', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html', 'http://secunia.com/advisories/45917', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-9fh3-vh3h-q4g3'}
null
RubyGems
GHSA-x457-cw4h-hq5f
High severity vulnerability that affects json
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
{'CVE-2013-0269'}
2022-03-03T05:14:17.891767Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010', 'http://www.ubuntu.com/usn/USN-1733-1', 'http://www.openwall.com/lists/oss-security/2013/02/11/8', 'http://rhn.redhat.com/errata/RHSA-2013-1028.html', 'http://www.openwall.com/lists/oss-security/2013/02/11/7', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://github.com/advisories/GHSA-x457-cw4h-hq5f', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html', 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862', 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://rhn.redhat.com/errata/RHSA-2013-1147.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'http://www.osvdb.org/90074', 'http://www.securityfocus.com/bid/57899', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'http://secunia.com/advisories/52902', 'http://secunia.com/advisories/52075', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html', 'http://secunia.com/advisories/52774', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269', 'https://puppet.com/security/cve/cve-2013-0269'}
null
RubyGems
GHSA-r8fh-hq2p-7qhq
High severity vulnerability that affects activerecord
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting.
{'CVE-2014-3483'}
2022-03-03T05:14:04.043551Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-89'}
{'http://www.debian.org/security/2014/dsa-2982', 'https://github.com/advisories/GHSA-r8fh-hq2p-7qhq', 'http://openwall.com/lists/oss-security/2014/07/02/5', 'http://rhn.redhat.com/errata/RHSA-2014-0877.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483', 'http://www.securityfocus.com/bid/68341', 'http://secunia.com/advisories/60214', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J', 'http://secunia.com/advisories/59971'}
null
RubyGems
GHSA-jppv-gw3r-w3q8
OS Command Injection in Rake
There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
{'CVE-2020-8130'}
2022-03-03T05:13:45.803499Z
2020-02-28T16:54:36Z
MODERATE
null
{'CWE-78'}
{'https://usn.ubuntu.com/4295-1/', 'https://hackerone.com/reports/651518', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130', 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/'}
null
RubyGems
GHSA-mgx3-27hr-mfgp
High severity vulnerability that affects httparty
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1801'}
2022-03-03T05:14:10.324559Z
2017-10-24T18:33:37Z
HIGH
null
null
{'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/jnunemaker/httparty', 'https://github.com/advisories/GHSA-mgx3-27hr-mfgp', 'https://bugzilla.redhat.com/show_bug.cgi?id=917229', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801', 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031', 'http://www.securityfocus.com/bid/58260'}
null
RubyGems
GHSA-cff7-6h4q-q5pj
Lacked element count during splitting of JWE string
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
{'CVE-2019-18848'}
2022-05-04T02:05:31.585529Z
2019-11-14T15:25:51Z
HIGH
null
{'CWE-20', 'CWE-287'}
{'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18848', 'https://github.com/nov/json-jwt', 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'}
null
RubyGems
GHSA-959j-5g9v-3fpq
Low severity vulnerability that affects paratrooper-newrelic
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
{'CVE-2014-1234'}
2022-03-03T05:13:54.593520Z
2017-10-24T18:33:36Z
LOW
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-959j-5g9v-3fpq', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234', 'http://openwall.com/lists/oss-security/2014/01/08/2', 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}
null
RubyGems
GHSA-85r7-w5mv-c849
Moderate severity vulnerability that affects rack
rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
{'CVE-2013-0262'}
2022-03-03T05:14:17.530513Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-22'}
{'https://gist.github.com/rentzsch/4736940', 'https://bugzilla.redhat.com/show_bug.cgi?id=909072', 'https://github.com/advisories/GHSA-85r7-w5mv-c849', 'http://rack.github.com/', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack', 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56', 'https://bugzilla.redhat.com/show_bug.cgi?id=909071', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262', 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30', 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ', 'http://secunia.com/advisories/52033', 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ'}
null
RubyGems
GHSA-wh98-p28r-vrc9
Exposure of information in Action Pack
### Impact Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with `ActiveSupport::CurrentAttributes`. Upgrading to the FIXED versions of Rails will ensure mitigation of this issue even in the context of a buggy webserver or middleware implementation. ### Patches This has been fixed in Rails 7.0.2.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. ### Workarounds Upgrading is highly recommended, but to work around this problem the following middleware can be used: ```ruby class GuardedExecutor < ActionDispatch::Executor def call(env) ensure_completed! super end private def ensure_completed! @executor.new.complete! if @executor.active? end end # Ensure the guard is inserted before ActionDispatch::Executor Rails.application.configure do config.middleware.swap ActionDispatch::Executor, GuardedExecutor, executor end ```
{'CVE-2022-23633'}
2022-03-03T05:13:17.293702Z
2022-02-11T20:49:14Z
HIGH
null
{'CWE-200'}
{'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da', 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9', 'https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016', 'https://github.com/rails/rails', 'https://rubyonrails.org/2022/2/11/Rails-7-0-2-2-6-1-4-6-6-0-4-6-and-5-2-6-2-have-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23633', 'http://www.openwall.com/lists/oss-security/2022/02/11/5'}
null
RubyGems
GHSA-5jcf-c5rg-rmm8
High severity vulnerability that affects paperclip
Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources.
{'CVE-2017-0889'}
2022-03-03T05:12:43.140731Z
2018-01-22T13:31:34Z
HIGH
null
{'CWE-918'}
{'https://hackerone.com/reports/209430', 'https://github.com/thoughtbot/paperclip/pull/2435', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889', 'https://github.com/advisories/GHSA-5jcf-c5rg-rmm8', 'https://hackerone.com/reports/713'}
null
RubyGems
GHSA-84j7-475p-hp8v
HTTP Response Splitting in Puma
In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
{'CVE-2020-5247'}
2022-03-03T05:13:06.415138Z
2020-02-28T16:53:55Z
MODERATE
null
{'CWE-113'}
{'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}
null
RubyGems
GHSA-gp82-xr77-88f4
Moderate severity vulnerability that affects radiant
There are multiple Persistent XSS vulnerabilities in Radiant CMS 1.1.4. They affect Personal Preferences (Name and Username) and Configuration (Site Title, Dev Site Domain, Page Parts, and Page Fields).
{'CVE-2018-7261'}
2021-09-13T12:38:11Z
2018-07-27T17:08:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-gp82-xr77-88f4', 'http://www.securityfocus.com/archive/1/541798/100/0/threaded', 'http://www.securityfocus.com/bid/103080', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7261'}
null
RubyGems
GHSA-4q53-fqhc-cr46
Low severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute.
{'CVE-2014-0046'}
2022-03-03T05:13:45.961401Z
2018-08-28T22:33:42Z
LOW
null
{'CWE-79'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242', 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ', 'http://secunia.com/advisories/56965', 'http://www.securityfocus.com/bid/65579', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046', 'http://www.openwall.com/lists/oss-security/2014/02/14/6', 'https://github.com/advisories/GHSA-4q53-fqhc-cr46', 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html'}
null
RubyGems
GHSA-6mq2-37j5-w6r6
Moderate severity vulnerability that affects webrick
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
{'CVE-2009-4492'}
2022-03-12T00:30:12.784581Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'http://secunia.com/advisories/37949', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492', 'http://www.redhat.com/support/errata/RHSA-2011-0908.html', 'http://www.redhat.com/support/errata/RHSA-2011-0909.html', 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection', 'http://www.securityfocus.com/archive/1/508830/100/0/threaded', 'http://www.vupen.com/english/advisories/2010/0089', 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6', 'http://www.securityfocus.com/bid/37710', 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt', 'http://securitytracker.com/id?1023429'}
null
RubyGems
GHSA-rwpr-83g3-96g7
Cross-site scripting in padrino-contrib
The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption.
{'CVE-2019-16145'}
2022-03-03T05:12:53.238757Z
2019-09-23T18:33:07Z
MODERATE
null
{'CWE-79'}
{'https://github.com/padrino/padrino-contrib/pull/35', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145'}
null
RubyGems
GHSA-f7p5-w2cr-7cp7
High severity vulnerability that affects puppet
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
{'CVE-2013-3567'}
2022-03-03T05:12:53.010963Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-f7p5-w2cr-7cp7', 'http://secunia.com/advisories/54429', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html', 'http://www.debian.org/security/2013/dsa-2715', 'http://www.ubuntu.com/usn/USN-1886-1', 'https://puppetlabs.com/security/cve/cve-2013-3567/', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html'}
null
RubyGems
GHSA-pjj4-w39g-pw54
Ox gem crashes due to a crafted input
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
{'CVE-2017-15928'}
2022-04-25T22:17:01.283452Z
2017-11-21T18:26:40Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-pjj4-w39g-pw54', 'https://github.com/ohler55/ox/issues/194', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928', 'https://github.com/ohler55/ox', 'https://rubygems.org/gems/ox/versions/2.8.0'}
null
RubyGems
GHSA-7wjx-3g7j-8584
Denial of Service in Action Controller Token Authentication
Impact ------ Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this: ``` class PostsController < ApplicationController before_action :authenticate private def authenticate authenticate_or_request_with_http_token do |token, options| # ... end end end ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue: ```ruby module ActionController::HttpAuthentication::Token AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/ end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-http-authentication-dos.patch - Patch for 5.2 series * 6-0-http-authentication-dos.patch - Patch for 6.0 series * 6-1-http-authentication-dos.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!
{'CVE-2021-22904'}
2022-03-03T05:13:31.543883Z
2021-05-05T19:49:12Z
HIGH
null
{'CWE-400'}
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://github.com/rails/rails/releases/tag/v5.2.4.6', 'https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22904', 'https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://hackerone.com/reports/1101125'}
null
RubyGems
GHSA-xwr3-fmgj-mmfr
Moderate severity vulnerability that affects bio-basespace-sdk
The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes.
{'CVE-2013-7111'}
2022-03-03T05:14:06.185702Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2013/12/14/2', 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr', 'http://www.openwall.com/lists/oss-security/2013/12/15/5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111', 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html'}
null
RubyGems
GHSA-c7j7-p5jq-26ff
Low severity vulnerability that affects passenger
Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
{'CVE-2014-1831'}
2022-03-03T05:13:06.506859Z
2018-10-10T17:29:20Z
LOW
null
null
{'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'https://github.com/phusion/passenger', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}
null
RubyGems
GHSA-8c56-cpmw-89x7
Out-of-bounds read in nokogiri
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2.
{'CVE-2017-9050'}
2022-03-03T05:13:53.907890Z
2017-12-13T21:38:24Z
HIGH
null
{'CWE-125'}
{'https://github.com/advisories/GHSA-8c56-cpmw-89x7', 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'http://www.securityfocus.com/bid/98568', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050', 'https://security.gentoo.org/glsa/201711-01', 'http://www.debian.org/security/2017/dsa-3952', 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}
null
RubyGems
GHSA-33pp-3763-mrfp
Moderate severity vulnerability that affects sprockets
Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
{'CVE-2014-7819'}
2022-03-03T05:13:31.300151Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-33pp-3763-mrfp', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html'}
null
RubyGems
GHSA-w6rc-q387-vpgq
Moderate severity vulnerability that affects passenger
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
{'CVE-2013-4136'}
2022-03-03T05:12:38.652146Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-59'}
{'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://github.com/phusion/passenger', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b', 'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://www.openwall.com/lists/oss-security/2013/07/16/6'}
null
RubyGems
GHSA-49r3-2549-3633
omniauth-apple allows attacker to fake their email address during authentication
### Impact This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users. For example, an application using omniauth-apple with the following code will be impacted: ```ruby def omniauth_callback auth_hash = request.env['omniauth.auth'] @authenticated_user = User.find_by(email: auth_hash.info.email) end ``` Applications not using `info.email` for identification but are instead using the `uid` field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of `info.email` is being used for other purposes. ### Patches Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later. ### Workarounds If unable to upgrade to a patched version, monkey patching `OmniAuth::Strategies::Apple#email` as follows is advised as a workaround: ```ruby module OmniAuth module Strategies class Apple def email id_info['email'] end end end end ```
{'CVE-2020-26254'}
2022-03-03T05:13:18.653035Z
2020-12-08T14:18:19Z
LOW
null
{'CWE-290'}
{'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254'}
null
RubyGems
GHSA-688c-3x49-6rqj
Moderate severity vulnerability that affects rack-protection
Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
{'CVE-2018-1000119'}
2022-03-03T05:12:58.358411Z
2018-03-07T22:22:22Z
MODERATE
null
{'CWE-203'}
{'https://github.com/sinatra/rack-protection/pull/98', 'https://github.com/sinatra/rack-protection', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://access.redhat.com/errata/RHSA-2018:1060'}
null
RubyGems
GHSA-fqrr-rrwg-69pv
Low severity vulnerability that affects paratrooper-pingdom
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
{'CVE-2014-1233'}
2022-03-03T05:13:16.698294Z
2017-10-24T18:33:36Z
LOW
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1233', 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html', 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv', 'http://openwall.com/lists/oss-security/2014/01/08/1'}
null
RubyGems
GHSA-q97v-764g-r2rp
High severity vulnerability that affects gollum and gollum-lib
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.
{'CVE-2014-9489'}
2022-03-03T05:13:49.192780Z
2017-11-16T01:47:37Z
HIGH
null
{'CWE-284'}
{'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.openwall.com/lists/oss-security/2015/01/03/19', 'https://github.com/gollum/gollum/issues/913', 'http://www.securityfocus.com/bid/71499', 'https://github.com/gollum/gollum', 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}
null
RubyGems
GHSA-fq42-c5rg-92c2
Vulnerable dependencies in Nokogiri
### Summary Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies: - vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news) - vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome.org/sources/libxslt/1.1/libxslt-1.1.35.news) Those library versions address the following upstream CVEs: - libxslt: [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) (CVSS 8.8, High severity) - libxml2: [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) (Unspecified severity, see more information below) Those library versions also address numerous other issues including performance improvements, regression fixes, and bug fixes, as well as memory leaks and other use-after-free issues that were not assigned CVEs. Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.2`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements. ### Mitigation Upgrade to Nokogiri `>= 1.13.2`. Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link an older version Nokogiri against external libraries libxml2 `>= 2.9.13` and libxslt `>= 1.1.35`, which will also address these same CVEs. ### Impact #### libxslt [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) - CVSS3 score: 8.8 (High) - Fixed by https://gitlab.gnome.org/GNOME/libxslt/-/commit/50f9c9c All versions of libxslt prior to v1.1.35 are affected. Applications using **untrusted** XSL stylesheets to transform XML are vulnerable to a denial-of-service attack and should be upgraded immediately. #### libxml2 [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) - As of the time this security advisory was published, there is no officially published information available about this CVE's severity. The above NIST link does not yet have a published record, and the libxml2 maintainer has declined to provide a severity score. - Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/652dd12 - Further explanation is at https://mail.gnome.org/archives/xml/2022-February/msg00015.html The upstream commit and the explanation linked above indicate that an application may be vulnerable to a denial of service, memory disclosure, or code execution if it parses an **untrusted** document with parse options `DTDVALID` set to true, and `NOENT` set to false. An analysis of these parse options: - While `NOENT` is off by default for Document, DocumentFragment, Reader, and Schema parsing, it is on by default for XSLT (stylesheet) parsing in Nokogiri v1.12.0 and later. - `DTDVALID` is an option that Nokogiri does not set for any operations, and so this CVE applies only to applications setting this option explicitly. It seems reasonable to assume that any application explicitly setting the parse option `DTDVALID` when parsing **untrusted** documents is vulnerable and should be upgraded immediately.
null
2022-03-03T05:13:22.187480Z
2022-02-25T20:32:09Z
HIGH
null
{'CWE-416'}
{'https://github.com/sparklemotion/nokogiri/', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2'}
null
RubyGems
GHSA-m2q3-53fq-7h66
Moderate severity vulnerability that affects gollum
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
{'CVE-2015-7314'}
2022-03-03T05:12:35.175360Z
2018-08-28T22:33:51Z
MODERATE
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2015/09/22/12', 'https://github.com/gollum/gollum/issues/1070', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'https://github.com/gollum/gollum', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314'}
null
RubyGems
GHSA-rfmf-rx8w-935w
High severity vulnerability that affects sounder
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
{'CVE-2013-5647'}
2022-03-03T05:13:53.103245Z
2017-10-24T18:33:37Z
HIGH
null
{'CWE-94'}
{'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html', 'https://github.com/advisories/GHSA-rfmf-rx8w-935w', 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}
null
RubyGems
GHSA-cf36-985g-v73c
Moderate severity vulnerability that affects omniauth-facebook
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
{'CVE-2013-4562'}
2022-03-03T05:13:58.524578Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-352'}
{'http://www.osvdb.org/99693', 'https://github.com/mkdynamic/omniauth-faceboo', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562', 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://seclists.org/oss-sec/2013/q4/264', 'http://seclists.org/oss-sec/2013/q4/267', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt'}
null
RubyGems
GHSA-fgmx-8h93-26fh
Moderate severity vulnerability that affects omniauth-oauth2
Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
{'CVE-2012-6134'}
2022-03-03T05:12:43.022623Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-352'}
{'https://gist.github.com/homakov/3673012', 'https://github.com/Shopify/omniauth-shopify-oauth2', 'https://github.com/intridea/omniauth-oauth2/pull/25', 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1', 'http://seclists.org/oss-sec/2013/q1/304', 'https://github.com/advisories/GHSA-fgmx-8h93-26fh', 'http://rubysec.github.io/advisories/CVE-2012-6134/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}
null
RubyGems
GHSA-7g65-ghrg-hpf5
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
{'CVE-2012-3465'}
2022-03-03T05:13:40.733744Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://secunia.com/advisories/50694', 'https://github.com/advisories/GHSA-7g65-ghrg-hpf5', 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}
null
RubyGems
GHSA-m7fq-cf8q-35q7
High severity vulnerability that affects crack
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1800'}
2022-03-03T05:12:56.495744Z
2017-10-24T18:33:37Z
HIGH
null
null
{'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html', 'http://secunia.com/advisories/52897', 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}
null
RubyGems
GHSA-9qj7-jvg4-qr2x
Moderate severity vulnerability that affects passenger
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem.
{'CVE-2013-2119'}
2022-03-03T05:12:42.468673Z
2017-10-24T18:33:37Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119', 'https://bugzilla.redhat.com/show_bug.cgi?id=892813', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}
null
RubyGems
GHSA-fr32-gr5c-xq5c
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
{'CVE-2019-8321'}
2022-03-03T05:13:46.723382Z
2019-06-20T16:06:04Z
HIGH
null
{'CWE-88'}
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321', 'https://hackerone.com/reports/317330', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
null
RubyGems
GHSA-3j95-fjv2-3m4p
CSS Injection in Chartkick gem
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
{'CVE-2020-16254'}
2022-03-03T05:13:43.419894Z
2020-08-12T14:29:15Z
MODERATE
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/ankane/chartkick'}
null
RubyGems
GHSA-mq35-wqvf-r23c
Sinatra has XSS via 400 Bad Request page via params parser exception
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
{'CVE-2018-11627'}
2022-04-26T18:17:15.940159Z
2018-06-05T21:32:06Z
MODERATE
null
{'CWE-79'}
{'https://access.redhat.com/errata/RHSA-2019:0315', 'https://github.com/advisories/GHSA-mq35-wqvf-r23c', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://github.com/sinatra/sinatra/issues/1428', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://github.com/sinatra/sinatra'}
null
RubyGems
GHSA-7322-9mx6-5j2m
High severity vulnerability that affects redcarpet
Stack-based buffer overflow in the header_anchor function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
{'CVE-2015-5147'}
2022-03-03T05:12:54.345182Z
2018-08-15T20:04:30Z
HIGH
null
{'CWE-119'}
{'https://github.com/vmg/redcarpet', 'http://www.securityfocus.com/bid/75508', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5147', 'http://www.openwall.com/lists/oss-security/2015/06/30/10', 'http://www.openwall.com/lists/oss-security/2015/06/29/3', 'https://github.com/advisories/GHSA-7322-9mx6-5j2m'}
null
RubyGems
GHSA-qv8p-v9qw-wc7g
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
{'CVE-2012-1098'}
2022-03-03T05:13:09.619817Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=799275', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098', 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-qv8p-v9qw-wc7g', 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}
null
RubyGems
GHSA-6fcq-3cm2-j3j5
Kcapifony gem for Ruby places database user passwords on the command line
lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.
{'CVE-2014-5001'}
2022-04-26T18:33:01.942616Z
2018-07-23T19:50:11Z
HIGH
null
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2014/07/07/21', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5001', 'http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html', 'https://github.com/advisories/GHSA-6fcq-3cm2-j3j5', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
null
RubyGems
GHSA-m42x-37p3-fv5w
Circumvention of file size limits in ActiveStorage
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user. Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1 Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded.
{'CVE-2020-8162'}
2022-03-03T05:14:18.028590Z
2020-05-26T15:09:48Z
LOW
null
{'CWE-602'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ', 'https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2020-8162.yml', 'https://hackerone.com/reports/789579', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162', 'https://www.debian.org/security/2020/dsa-4766'}
null
RubyGems
GHSA-8qrh-h9m2-5fvf
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
{'CVE-2009-3009'}
2022-03-03T05:13:20.246903Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://www.vupen.com/english/advisories/2009/2544', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063', 'http://secunia.com/advisories/36600', 'http://support.apple.com/kb/HT4077', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.osvdb.org/57666', 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source', 'http://www.securityfocus.com/bid/36278', 'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails', 'http://www.debian.org/security/2009/dsa-1887', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036', 'http://securitytracker.com/id?1022824', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009', 'http://secunia.com/advisories/36717', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}
null
RubyGems
GHSA-58r4-h6v8-jcvm
Regression in JWT Signature Validation
### Overview Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization. ### Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using `omniauth-auth0`. - You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. ### How to fix that? Upgrade to version `2.4.1`. ### Will this update impact my users? The fix provided in this version will not affect your users.
{'CVE-2020-15240'}
2022-03-03T05:14:16.039069Z
2020-11-03T02:31:38Z
HIGH
null
{'CWE-347', 'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm', 'https://github.com/auth0/omniauth-auth0', 'https://rubygems.org/gems/omniauth-auth0'}
null
RubyGems
GHSA-jxjr-5h69-qw3w
Moderate severity vulnerability that affects nokogiri
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
{'CVE-2015-7499'}
2022-03-03T05:13:29.255791Z
2018-09-17T21:57:38Z
MODERATE
null
{'CWE-119'}
{'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://support.apple.com/HT206166', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc', 'http://www.debian.org/security/2015/dsa-3430', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://xmlsoft.org/news.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://support.apple.com/HT206167', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206169', 'http://www.securitytracker.com/id/1034243', 'https://support.apple.com/HT206168', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'https://security.gentoo.org/glsa/201701-37', 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://www.securityfocus.com/bid/79509', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}
null
RubyGems
GHSA-8727-m6gj-mc37
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack. Versions Affected: rails <= 6.0.3 Not affected: rails < 4.0.0 Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ In some cases user supplied information can be inadvertently leaked from Strong Parameters. Specifically the return value of `each`, or `each_value`, or `each_pair` will return the underlying "untrusted" hash of data that was read from the parameters. Applications that use this return value may be inadvertently use untrusted user input. Impacted code will look something like this: ``` def update # Attacker has included the parameter: `{ is_admin: true }` User.update(clean_up_params) end def clean_up_params params.each { |k, v| SomeModel.check(v) if k == :name } end ``` Note the mistaken use of `each` in the `clean_up_params` method in the above example. Workarounds ----------- Do not use the return values of `each`, `each_value`, or `each_pair` in your application.
{'CVE-2020-8164'}
2022-03-03T05:13:52.237370Z
2020-05-26T15:09:16Z
MODERATE
null
{'CWE-502'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html', 'https://hackerone.com/reports/292797', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html', 'https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164', 'https://www.debian.org/security/2020/dsa-4766'}
null
RubyGems
GHSA-fcqf-h4h4-695m
Moderate severity vulnerability that affects actionpack
CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
{'CVE-2011-3186'}
2022-03-03T05:12:52.686804Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-94'}
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'https://bugzilla.redhat.com/show_bug.cgi?id=732156', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'https://github.com/advisories/GHSA-fcqf-h4h4-695m'}
null
RubyGems
GHSA-q6cw-2553-7837
Moderate severity vulnerability that affects newrelic_rpm
Ruby agent 3.2.0 through 3.5.2 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
{'CVE-2013-0284'}
2022-03-03T05:12:29.612828Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-200'}
{'https://newrelic.com/docs/ruby/ruby-agent-security-notification', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284', 'http://seclists.org/oss-sec/2013/q1/304', 'https://github.com/advisories/GHSA-q6cw-2553-7837'}
null
RubyGems
GHSA-29gr-w57f-rpfw
Moderate severity vulnerability that affects actionpack
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
{'CVE-2014-7818'}
2022-03-03T05:13:14.618922Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://github.com/advisories/GHSA-29gr-w57f-rpfw', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ', 'https://puppet.com/security/cve/cve-2014-7829'}
null
RubyGems
GHSA-jrfj-98qg-qjgv
Denial of service in sidekiq
In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
{'CVE-2022-23837'}
2022-03-11T20:16:49.892671Z
2022-01-27T14:42:37Z
HIGH
null
{'CWE-400', 'CWE-770'}
{'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md', 'https://github.com/mperham/sidekiq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23837'}
null
RubyGems
GHSA-g397-v4w5-4m79
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-21223'}
2022-04-12T15:55:10.852941Z
2022-04-02T00:00:13Z
HIGH
null
{'CWE-74', 'CWE-88'}
{'https://github.com/CocoaPods/cocoapods-downloader/pull/127', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223', 'https://github.com/CocoaPods/cocoapods-downloader'}
null
RubyGems
GHSA-7vxr-6cxg-j3x8
OS Command Injection in ftpd
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
{'CVE-2013-2512'}
2022-03-03T05:13:15.551362Z
2021-10-12T22:33:59Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/wconrad/ftpd'}
null
RubyGems
GHSA-j5rj-g695-342r
Moderate severity vulnerability that affects fat_free_crm
FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, 0.14.2.
{'CVE-2018-1000842'}
2022-03-03T05:13:50.305320Z
2018-12-20T22:01:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-j5rj-g695-342r', 'https://github.com/asteinhauser/fat_free_crm/', 'https://github.com/asteinhauser/fat_free_crm/issues/1', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}
null
RubyGems
GHSA-v9v4-7jp6-8c73
Moderate severity vulnerability that affects rails
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
{'CVE-2011-2197'}
2022-03-03T05:13:37.120014Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-79'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197', 'https://github.com/advisories/GHSA-v9v4-7jp6-8c73', 'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications', 'http://openwall.com/lists/oss-security/2011/06/13/9', 'http://openwall.com/lists/oss-security/2011/06/09/2', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html', 'http://secunia.com/advisories/44789', 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain', 'https://github.com/rails/rails'}
null
RubyGems
GHSA-hhwc-8g49-j8jx
Incorrect Permission Assignment for Critical Resource in ruby_parser-legacy
The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file.
{'CVE-2019-18409'}
2022-03-03T05:12:48.637526Z
2019-10-25T19:41:34Z
HIGH
null
{'CWE-732'}
{'https://github.com/zenspider/ruby_parser-legacy/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18409'}
null
RubyGems
GHSA-vx9j-46rh-fqr8
Moderate severity vulnerability that affects actionview
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
{'CVE-2016-2097'}
2022-03-03T05:13:00.766699Z
2017-10-24T18:33:35Z
MODERATE
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-vx9j-46rh-fqr8', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://www.securitytracker.com/id/1035122', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://www.securityfocus.com/bid/83726', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'http://www.debian.org/security/2016/dsa-3509', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}
null
RubyGems
GHSA-r53w-g4xm-3gc6
Cross-site scripting in Haml
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
{'CVE-2017-1002201'}
2022-03-03T05:14:02.155160Z
2019-10-21T21:59:13Z
MODERATE
null
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/haml/haml/', 'https://security.gentoo.org/glsa/202007-27'}
null
RubyGems
GHSA-fhj9-cjjh-27vm
Critical severity vulnerability that affects activerecord
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
{'CVE-2013-0277'}
2022-03-03T05:14:05.893122Z
2017-10-24T18:33:37Z
CRITICAL
null
null
{'http://www.osvdb.org/90073', 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain', 'http://support.apple.com/kb/HT5784', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277', 'http://www.openwall.com/lists/oss-security/2013/02/11/6', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://securitytracker.com/id?1028109', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://puppet.com/security/cve/cve-2013-0277', 'http://www.debian.org/security/2013/dsa-2620', 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://secunia.com/advisories/52112', 'https://github.com/advisories/GHSA-fhj9-cjjh-27vm'}
null
RubyGems
GHSA-pr3h-jjhj-573x
High severity vulnerability that affects sprockets
Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately. Workaround: In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets. This work around will not be possible in all hosting environments and upgrading is advised.
{'CVE-2018-3760'}
2022-03-03T05:12:55.724463Z
2018-06-20T22:18:58Z
HIGH
null
{'CWE-22', 'CWE-200'}
{'https://github.com/rails/sprockets', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760', 'https://access.redhat.com/errata/RHSA-2018:2745', 'https://www.debian.org/security/2018/dsa-4242', 'https://github.com/advisories/GHSA-pr3h-jjhj-573x', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5fhttps://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ', 'https://access.redhat.com/errata/RHSA-2018:2245'}
null
RubyGems
GHSA-fcjw-8rhj-gwwc
Authentication Bypass in Devise
An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.)
{'CVE-2019-16109'}
2022-03-03T05:12:46.189456Z
2019-09-11T23:06:57Z
HIGH
null
{'CWE-284'}
{'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1', 'https://github.com/plataformatec/devise/pull/5132', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109', 'https://github.com/plataformatec/devise/issues/5071'}
null
RubyGems
GHSA-xmgj-5fh3-xjmm
Path traversal when MessageBus::Diagnostics is enabled
### Impact Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. ### Patches Patched in 3.3.7. ### Workarounds Disable MessageBus::Diagnostics in production like environments.
{'CVE-2021-43840'}
2022-03-03T05:13:02.780448Z
2021-12-17T19:59:13Z
MODERATE
null
{'CWE-22'}
{'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba', 'https://github.com/discourse/message_bus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840'}
null
RubyGems
GHSA-w3j4-76qw-wwjm
Older releases of better_errors open to Cross-Site Request Forgery attack
### Impact better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks. _As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._ ### Patches Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3". ### Workarounds There are no known workarounds to mitigate the risk of using older releases of better_errors. ### References - Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/) ### For more information If you have any questions or comments about this advisory, please - Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507) - Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
{'CVE-2021-39197'}
2022-03-03T05:14:16.248141Z
2021-09-07T23:08:24Z
MODERATE
null
{'CWE-352'}
{'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/better_errors/discussions/507', 'https://github.com/BetterErrors/better_errors', 'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://github.com/BetterErrors/better_errors/pull/474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197'}
null
RubyGems
GHSA-xq5j-gw7f-jgj8
CSRF Vulnerability in rails-ujs
There is an vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains. Versions Affected: rails <= 6.0.3 Not affected: Applications which don't use rails-ujs. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ This is a regression of CVE-2015-1840. In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent. Workarounds ----------- To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters. For example, code like this: link_to params to code like this: link_to filtered_params def filtered_params # Filter just the parameters that you trust end
{'CVE-2020-8167'}
2022-03-03T05:14:09.149254Z
2020-07-07T16:34:10Z
MODERATE
null
{'CWE-352'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml', 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0', 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8167', 'https://hackerone.com/reports/189878', 'https://www.debian.org/security/2020/dsa-4766'}
null
RubyGems
GHSA-mm33-5vfq-3mm3
XSS Vulnerability in Action Pack
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been assigned the CVE identifier CVE-2022-22577. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact CSP headers were only sent along with responses that Rails considered as "HTML" responses. This left API requests without CSP headers, which could possibly expose users to XSS attacks. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Set a CSP for your API responses manually.
{'CVE-2022-22577'}
2022-04-27T23:16:59.053710Z
2022-04-27T22:28:59Z
HIGH
null
{'CWE-79'}
{'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI', 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml', 'https://github.com/rails/rails/pull/44635', 'https://github.com/rails/rails'}
null
RubyGems
GHSA-7627-mp87-jf6q
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-24440'}
2022-04-12T15:46:03.452200Z
2022-04-02T00:00:13Z
HIGH
null
{'CWE-74', 'CWE-88'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24440', 'https://github.com/CocoaPods/cocoapods-downloader/pull/124', 'https://github.com/CocoaPods/cocoapods-downloader/pull/128', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278', 'https://github.com/CocoaPods/cocoapods-downloader'}
null
RubyGems
GHSA-333g-rpr4-7hxq
Backdoor / Malicious code
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x. Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory. These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.
{'CVE-2019-15224'}
2022-04-01T14:17:08.603600Z
2019-08-20T14:29:03Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15224', 'https://github.com/rest-client/rest-client/issues/713', 'https://rubygems.org/gems/rest-client/versions/'}
null
RubyGems
GHSA-2xvj-j3qh-x8c3
High severity vulnerability that affects private_address_check
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
{'CVE-2018-3759'}
2022-03-03T05:12:45.204597Z
2018-07-31T18:13:05Z
HIGH
null
{'CWE-362'}
{'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147', 'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759'}
null
RubyGems
GHSA-5629-8855-gf4g
Authentication Bypass by CSRF Weakness
### Impact The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details. The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end. ### Patches For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`. ### Workarounds Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). ### References - [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2). ### For more information If you have any questions or comments about this advisory: * Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions) * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
null
2022-03-07T20:46:57.244494Z
2021-11-18T20:12:40Z
CRITICAL
null
{'CWE-352', 'CWE-305'}
{'https://github.com/solidusio/solidus', 'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
null
RubyGems
GHSA-23f7-99jx-m54r
Remote code execution in dependabot-core branch names when cloning
### Impact Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. When Dependabot is configured to clone the source repository during an update, Dependabot runs a shell command to git clone the repository: ```bash git clone --no-tags --no-recurse-submodules --depth=1 --branch=<BRANCH> --single-branch <GITHUB_REPO_URL> repo/contents/path ``` Dependabot will always clone the source repository for `go_modules` during the file fetching step and can be configured to clone the repository for other package managers using the `FileFetcher` class from `dependabot-common`. ```ruby source = Dependabot::Source.new( provider: "github", repo: "repo/name", directory: "/", branch: "/$({curl,127.0.0.1})", ) repo_contents_path = "./file/path" fetcher = Dependabot::FileFetchers.for_package_manager("bundler"). new(source: source, credentials: [], repo_contents_path: repo_contents_path) fetcher.clone_repo_contents ``` ### Patches The fix was applied to version `0.125.1`: https://github.com/dependabot/dependabot-core/pull/2727 ### Workarounds Escape the branch name prior to passing it to the `Dependabot::Source` class. For example using `shellwords`: ```ruby require "shellwords" branch = Shellwords.escape("/$({curl,127.0.0.1})") source = Dependabot::Source.new( provider: "github", repo: "repo/name", directory: "/", branch: branch, ) ```
{'CVE-2020-26222'}
2022-03-03T05:13:27.535302Z
2020-11-13T15:47:50Z
LOW
null
{'CWE-74'}
{'https://github.com/dependabot/dependabot-core/pull/2727', 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://rubygems.org/gems/dependabot-common'}
null
RubyGems
GHSA-rxq3-gm4p-5fj4
High severity vulnerability that affects rails
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
{'CVE-2009-2422'}
2022-03-03T05:13:25.883872Z
2017-10-24T18:33:38Z
HIGH
null
{'CWE-287'}
{'http://www.vupen.com/english/advisories/2009/1802', 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4', 'http://secunia.com/advisories/35702', 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528', 'http://support.apple.com/kb/HT4077', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422', 'http://www.securityfocus.com/bid/35579'}
null
RubyGems
GHSA-c289-47qf-rvrr
Low severity vulnerability that affects easymon
easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later.
{'CVE-2018-1000855'}
2022-03-03T05:13:20.796361Z
2018-12-21T17:46:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/basecamp/easymon/issues/26', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855', 'https://github.com/advisories/GHSA-c289-47qf-rvrr', 'https://github.com/basecamp/easymon', 'https://github.com/basecamp/easymon/pull/25'}
null
RubyGems
GHSA-vr8q-g5c7-m54m
XXE in Nokogiri
### Severity Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N). ### Description In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as **untrusted** by default whenever possible. Please note that this security fix was pushed into a new minor version, 1.11.x, rather than a patch release to the 1.10.x branch, because it is a breaking change for some schemas and the risk was assessed to be "Low Severity". ### Affected Versions Nokogiri `<= 1.10.10` as well as prereleases `1.11.0.rc1`, `1.11.0.rc2`, and `1.11.0.rc3` ### Mitigation There are no known workarounds for affected versions. Upgrade to Nokogiri `1.11.0.rc4` or later. If, after upgrading to `1.11.0.rc4` or later, you wish to re-enable network access for resolution of external resources (i.e., return to the previous behavior): 1. Ensure the input is trusted. Do not enable this option for untrusted input. 2. When invoking the `Nokogiri::XML::Schema` constructor, pass as the second parameter an instance of `Nokogiri::XML::ParseOptions` with the `NONET` flag turned off. So if your previous code was: ``` ruby # in v1.11.0.rc3 and earlier, this call allows resources to be accessed over the network # but in v1.11.0.rc4 and later, this call will disallow network access for external resources schema = Nokogiri::XML::Schema.new(schema) # in v1.11.0.rc4 and later, the following is equivalent to the code above # (the second parameter is optional, and this demonstrates its default value) schema = Nokogiri::XML::Schema.new(schema, Nokogiri::XML::ParseOptions::DEFAULT_SCHEMA) ``` Then you can add the second parameter to indicate that the input is trusted by changing it to: ``` ruby # in v1.11.0.rc3 and earlier, this would raise an ArgumentError # but in v1.11.0.rc4 and later, this allows resources to be accessed over the network schema = Nokogiri::XML::Schema.new(trusted_schema, Nokogiri::XML::ParseOptions.new.nononet) ``` ### References - [This issue's public advisory](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m) - [Original Hackerone report (private)](https://hackerone.com/reports/747489) - [OWASP description of XXE attack](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing) - [OWASP description of SSRF attack](https://www.owasp.org/index.php/Server_Side_Request_Forgery) ### Credit This vulnerability was independently reported by @eric-therond and @gucki. The Nokogiri maintainers would like to thank [HackerOne](https://hackerone.com/nokogiri) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to us.
{'CVE-2020-26247'}
2022-03-03T05:14:07.122463Z
2020-12-30T18:35:06Z
MODERATE
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://rubygems.org/gems/nokogiri', 'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html', 'https://hackerone.com/reports/747489', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4', 'https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03'}
null
RubyGems
GHSA-cf3w-g86h-35x4
Code Injection vulnerability in CarrierWave::RMagick
### Impact [CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be executed as a Ruby code. If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE). (But supplying untrusted input to the option itself is dangerous even in absence of this vulnerability, since is prone to DoS vulnerability - attackers can try to consume massive amounts of memory by resizing to a very large dimension) ### Proof of Concept ```ruby class MyUploader < CarrierWave::Uploader::Base include CarrierWave::RMagick end MyUploader.new.manipulate!({ read: { density: "1 }; p 'Hacked'; {" }}) # => shows "Hacked" ``` ### Patches Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). ### Workarounds Stop supplying untrusted input to `#manipulate!`'s mutation option. ### References [Code Injection Software Attack](https://owasp.org/www-community/attacks/Code_Injection) ### For more information If you have any questions or comments about this advisory: * Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) * Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
{'CVE-2021-21305'}
2022-04-27T20:00:06.549782Z
2021-02-08T19:16:39Z
HIGH
null
{'CWE-94', 'CWE-74'}
{'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://rubygems.org/gems/carrierwave', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305', 'https://github.com/carrierwaveuploader/carrierwave'}
null
RubyGems
GHSA-cxf7-qrc5-9446
Remote shell execution vulnerability in image_processing
### Impact When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands: ```rb ImageProcessing::Vips.apply({ system: "echo EXECUTED" }) #>> EXECUTED ``` This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. ### Patches The vulnerability has been fixed in version 1.12.2 of image_processing. ### Workarounds If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example: ```rb operations = params[:operations] .map { |operation| [operation[:name], *operation[:value]] } .select { |name, *| name.to_s.include? %w[resize_to_limit strip ...] } # sanitization ImageProcessing::Vips.apply(operations) ```
{'CVE-2022-24720'}
2022-03-10T16:02:30.163279Z
2022-03-01T22:22:26Z
CRITICAL
null
{'CWE-20', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/janko/image_processing', 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada', 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'}
null
RubyGems
GHSA-cqxw-3p7v-p9gr
Phusion Passenger uses a known /tmp filename
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
{'CVE-2016-10345'}
2022-04-26T20:45:11.460991Z
2018-08-21T17:08:03Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10345', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr', 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://github.com/phusion/passenger/', 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG'}
null
RubyGems
GHSA-3892-2r52-p65m
HTTP Request Smuggling in goliath
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
{'CVE-2020-7671'}
2022-03-03T05:12:56.701867Z
2021-05-24T18:20:07Z
MODERATE
null
{'CWE-444'}
{'https://github.com/postrank-labs/goliath/issues/351,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7671', 'https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136'}
null
RubyGems
GHSA-jxx8-v83v-rhw3
Moderate severity vulnerability that affects spree
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
{'CVE-2013-1656'}
2022-03-03T05:13:44.581066Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-20'}
{'https://www.conviso.com.br/advisories/CVE-2013-1656.txt', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656', 'http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html', 'https://github.com/advisories/GHSA-jxx8-v83v-rhw3'}
null
RubyGems
GHSA-3m6r-39p3-jq25
Doorkeeper is vulnerable to replay attacks
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
{'CVE-2016-6582'}
2022-04-25T16:47:07.153658Z
2017-10-24T18:33:35Z
CRITICAL
null
{'CWE-1254'}
{'https://github.com/advisories/GHSA-3m6r-39p3-jq25', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/doorkeeper-gem/doorkeeper/issues/875', 'http://www.securityfocus.com/archive/1/539268/100/0/threaded', 'http://seclists.org/fulldisclosure/2016/Aug/105', 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html', 'https://github.com/doorkeeper-gem/doorkeeper/', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0', 'http://www.securityfocus.com/bid/92551'}
null
RubyGems
GHSA-r74q-gxcg-73hx
High severity vulnerability that affects simple_form
## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call ### Impact For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example: ```erb <%= simple_form_for @user do |f| %> <%= f.label @user_supplied_string %> ... <% end %> ``` The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`). By manipulation that input, an attacker could do any of the following: - Code execution (call actions like `#destroy`) - Denial of Service (by executing a computation intensive method) - Information Disclosure (check the presence of methods, leak user information) ### Patches The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem. ### Workarounds The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected. A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following: ```erb <%= form.input :avatar, as: :file %> ``` ### References [TDB] ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form) * Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br)
{'CVE-2019-16676'}
2022-03-03T05:11:44.264367Z
2019-09-30T19:41:15Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/plataformatec/simple_form/commits/master', 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/'}
null
RubyGems
GHSA-x24j-87x9-jvv5
Improper Authorization in Publify
In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only.
{'CVE-2021-25973'}
2022-03-07T20:47:49.397012Z
2021-11-03T17:34:22Z
MODERATE
null
{'CWE-285', 'CWE-863'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e', 'https://github.com/publify/publify/'}
null
RubyGems
GHSA-3v3c-r5v2-68ph
High severity vulnerability that affects private_address_check
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
{'CVE-2017-0909'}
2022-03-03T05:13:55.446026Z
2017-11-30T23:14:55Z
HIGH
null
{'CWE-184'}
{'https://github.com/jtdowney/private_address_check/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909', 'https://hackerone.com/reports/288950', 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}
null
RubyGems
GHSA-r7q2-5gqg-6c7q
Moderate severity vulnerability that affects actionpack
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
{'CVE-2011-2929'}
2022-03-03T05:13:11.142719Z
2017-10-24T18:33:38Z
MODERATE
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}
null
RubyGems
GHSA-ghqm-pgxj-37gq
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
{'CVE-2015-7580'}
2022-03-03T05:13:29.804586Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580', 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78', 'http://www.openwall.com/lists/oss-security/2016/01/25/15', 'https://github.com/advisories/GHSA-ghqm-pgxj-37gq', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://github.com/rails/rails-html-sanitizer/', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
null
crates.io
GHSA-g4g4-3pqw-8m7f
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free.
{'CVE-2021-45718'}
2022-01-06T20:20:29Z
2022-01-06T22:02:01Z
HIGH
null
{'CWE-416'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md', 'https://github.com/rusqlite/rusqlite/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45718', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html'}
null
crates.io
GHSA-5rrv-m36h-qwf8
Use-after-free in chttp
An issue was discovered in the chttp crate before 0.1.3 for Rust. There is a use-after-free during buffer conversion.
{'CVE-2019-16140'}
2021-08-19T21:22:50Z
2021-08-25T20:44:40Z
CRITICAL
null
{'CWE-416'}
{'https://github.com/sagebind/chttp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16140', 'https://github.com/sagebind/isahc/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2019-0016.html'}
null