ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
RubyGems
|
GHSA-hwhh-2fwm-cfgw
|
Doorkeeper is vulnerable to stored XSS and code execution
|
Doorkeeper version 2.1.0 through 4.2.5 contains a Cross Site Scripting (XSS) vulnerability in web view's OAuth app form, user authorization prompt web view that can result in Stored XSS on the OAuth Client's name will cause users interacting with it will execute payload. This attack appear to be exploitable via The victim must be tricked to click an opaque link to the web view that runs the XSS payload. A malicious version virtually indistinguishable from a normal link. This vulnerability appears to have been fixed in 4.2.6, 4.3.0.
|
{'CVE-2018-1000088'}
|
2022-04-26T17:46:52.416570Z
|
2018-03-13T20:44:48Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/doorkeeper-gem/doorkeeper/issues/969', 'https://github.com/doorkeeper-gem/doorkeeper', 'https://github.com/rubysec/ruby-advisory-db/pull/328/files', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000088', 'https://github.com/doorkeeper-gem/doorkeeper/pull/970', 'https://github.com/advisories/GHSA-hwhh-2fwm-cfgw'}
| null |
RubyGems
|
GHSA-v6fx-752r-ccp2
|
CSRF on PgHero gem
|
The PgHero gem through 2.6.0 for Ruby allows CSRF.
|
{'CVE-2020-16253'}
|
2022-03-03T05:13:14.287515Z
|
2020-08-05T14:53:43Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/ankane/pghero', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pghero/CVE-2020-16253.yml', 'https://rubygems.org/gems/pghero', 'https://github.com/ankane/pghero/', 'https://github.com/ankane/pghero/issues/330', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16253', 'https://github.com/ankane/pghero/commit/14b67b32fed19a30aaf9826ee72f2a29cda604e9'}
| null |
RubyGems
|
GHSA-xjqg-9jvg-fgx2
|
High severity vulnerability that affects nokogiri
|
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 (as used in nokogiri before 1.6.7.1) does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
|
{'CVE-2015-5312'}
|
2022-03-03T05:13:37.789725Z
|
2018-08-21T19:03:04Z
|
HIGH
| null | null |
{'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://support.apple.com/HT206166', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5312', 'http://www.debian.org/security/2015/dsa-3430', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e', 'http://www.ubuntu.com/usn/USN-2834-1', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://xmlsoft.org/news.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://support.apple.com/HT206167', 'http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206169', 'http://www.securitytracker.com/id/1034243', 'https://github.com/advisories/GHSA-xjqg-9jvg-fgx2', 'https://support.apple.com/HT206168', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'http://www.securityfocus.com/bid/79536', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1276693', 'https://security.gentoo.org/glsa/201701-37', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}
| null |
RubyGems
|
GHSA-76wm-422q-92mq
|
Code injection in RubyGems
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
|
{'CVE-2019-8324'}
|
2022-03-03T05:13:39.303080Z
|
2019-06-20T16:06:11Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8324', 'https://access.redhat.com/errata/RHSA-2019:1972', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://hackerone.com/reports/328571'}
| null |
RubyGems
|
GHSA-7hp2-xwpj-95jq
|
Nokogiri, dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash)
|
dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.
|
{'CVE-2015-8806'}
|
2022-04-26T18:48:01.838715Z
|
2018-09-17T21:53:42Z
|
HIGH
| null |
{'CWE-125'}
|
{'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html', 'https://github.com/advisories/GHSA-7hp2-xwpj-95jq', 'https://www.debian.org/security/2016/dsa-3593', 'https://bugzilla.gnome.org/show_bug.cgi?id=749115', 'http://www.ubuntu.com/usn/USN-2994-1', 'http://www.securityfocus.com/bid/82071', 'https://security.gentoo.org/glsa/201701-37', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806', 'http://www.openwall.com/lists/oss-security/2016/02/03/5'}
| null |
RubyGems
|
GHSA-h6w6-xmqv-7q78
|
High severity vulnerability that affects activerecord
|
Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
|
{'CVE-2011-2930'}
|
2022-03-03T05:14:21.566569Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-h6w6-xmqv-7q78', 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=731438', 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}
| null |
RubyGems
|
GHSA-fxwv-953p-7qpf
|
Phusion Passenger allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header
|
agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X_User header.
|
{'CVE-2015-7519'}
|
2022-04-26T18:33:06.194040Z
|
2018-10-10T17:29:13Z
|
LOW
| null |
{'CWE-20'}
|
{'http://www.openwall.com/lists/oss-security/2015/12/07/1', 'https://blog.phusion.nl/2015/12/07/cve-2015-7519/', 'https://bugzilla.suse.com/show_bug.cgi?id=956281', 'https://github.com/phusion/passenger', 'https://puppet.com/security/cve/passenger-dec-2015-security-fixes', 'http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00024.html', 'https://github.com/advisories/GHSA-fxwv-953p-7qpf', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00007.html', 'https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7519', 'http://www.openwall.com/lists/oss-security/2015/12/07/2'}
| null |
RubyGems
|
GHSA-8r6h-7x9g-xmw9
|
Moderate severity vulnerability that affects will_paginate
|
Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.
|
{'CVE-2013-6459'}
|
2022-03-03T05:14:19.548643Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mislav/will_paginate/releases/tag/v3.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459', 'https://github.com/advisories/GHSA-8r6h-7x9g-xmw9', 'http://www.securityfocus.com/bid/64509', 'https://access.redhat.com/errata/RHSA-2018:0336', 'http://secunia.com/advisories/56180'}
| null |
RubyGems
|
GHSA-jj47-x69x-mxrm
|
Buffer Overflow in yajl-ruby
|
yajl-ruby is a streaming JSON parsing and encoding library for Ruby (C bindings to yajl) based on the YAJL library.
The 1.x branch and the 2.x branch of [yajl](https://github.com/lloyd/yajl) contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs.
### Details
The [reallocation logic at yajl_buf.c#L64](https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64) may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk.
These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer.
Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption.
### Impact
We rate this as a moderate severity vulnerability which mostly impacts process availability as we believe exploitation for arbitrary code execution to be unlikely.
### Patches
Patched in yajl-ruby 1.4.2
### Workarounds
Avoid passing large inputs to YAJL
### References
https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [yajl-ruby](https://github.com/brianmario/yajl-ruby/issues)
|
{'CVE-2022-24795'}
|
2022-04-06T21:16:57.159918Z
|
2022-04-05T15:55:51Z
|
MODERATE
| null |
{'CWE-190', 'CWE-122'}
|
{'https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64', 'https://github.com/brianmario/yajl-ruby', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24795', 'https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6', 'https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm'}
| null |
RubyGems
|
GHSA-w37c-q653-qg95
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in the simple_format helper in actionpack/lib/action_view/helpers/text_helper.rb in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute.
|
{'CVE-2013-6416'}
|
2022-03-03T05:13:00.001966Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/5ZI1-H5OoIM/ZNq4FoR2GnIJ', 'http://www.securityfocus.com/bid/64071', 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416', 'https://github.com/rails/rails', 'https://github.com/advisories/GHSA-w37c-q653-qg95'}
| null |
RubyGems
|
GHSA-2rqw-v265-jf8c
|
Open Redirect in ActionPack
|
# Overview
There is a possible open redirect vulnerability in the Host Authorization
middleware in Action Pack. This vulnerability has been assigned the CVE
identifier CVE-2021-22942.
Versions Affected: >= 6.0.0.
Not affected: < 6.0.0
Fixed Versions: 6.1.4.1, 6.0.4.1
# Impact
Specially crafted “X-Forwarded-Host” headers in combination with certain
“allowed host” formats can cause the Host Authorization middleware in
Action Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot.
For example, configuration files that look like this:
```ruby
config.hosts << '.EXAMPLE.com'
```
When an allowed host contains a leading dot, a specially crafted
Host header can be used to redirect to a malicious website.
This vulnerability is similar to CVE-2021-22881, but CVE-2021-22881 did not
take in to account domain name case sensitivity.
# Releases
The fixed releases are available at the normal locations.
# Workarounds
In the case a patch can’t be applied, the following monkey patch can be
used in an initializer:
```ruby
module ActionDispatch
class HostAuthorization
HOSTNAME = /[a-z0-9.-]+|\[[a-f0-9]*:[a-f0-9.:]+\]/i
VALID_ORIGIN_HOST = /\A(#{HOSTNAME})(?::\d+)?\z/
VALID_FORWARDED_HOST = /(?:\A|,[ ]?)(#{HOSTNAME})(?::\d+)?\z/
private
def authorized?(request)
origin_host =
request.get_header("HTTP_HOST")&.slice(VALID_ORIGIN_HOST, 1) || ""
forwarded_host =
request.x_forwarded_host&.slice(VALID_FORWARDED_HOST, 1) || ""
@permissions.allows?(origin_host) &&
(forwarded_host.blank? || @permissions.allows?(forwarded_host))
end
end
end
```
|
{'CVE-2021-22942'}
|
2022-03-03T05:13:45.147448Z
|
2021-08-26T20:36:51Z
|
HIGH
| null |
{'CWE-601'}
|
{'http://www.openwall.com/lists/oss-security/2021/12/14/5', 'https://rubygems.org/gems/actionpack', 'https://groups.google.com/g/rubyonrails-security/c/wB5tRn7h36c', 'https://access.redhat.com/security/cve/cve-2021-22942', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22942', 'https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released/', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2021-22942.yml'}
| null |
RubyGems
|
GHSA-c3gv-9cxf-6f57
|
Cross-site Scripting in Loofah
|
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
|
{'CVE-2019-15587'}
|
2022-03-03T05:11:52.904209Z
|
2019-11-05T23:58:25Z
|
LOW
| null |
{'CWE-79'}
|
{'https://usn.ubuntu.com/4498-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15587', 'https://hackerone.com/reports/709009', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/', 'https://security.netapp.com/advisory/ntap-20191122-0003/', 'https://www.debian.org/security/2019/dsa-4554', 'https://github.com/flavorjones/loofah/issues/171'}
| null |
RubyGems
|
GHSA-v5jg-558j-q67c
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
|
{'CVE-2011-2931'}
|
2022-03-03T05:13:59.190408Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/advisories/GHSA-v5jg-558j-q67c', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731436', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931', 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'https://github.com/rails/rails', 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}
| null |
RubyGems
|
GHSA-jmgf-p46x-982h
|
Moderate severity vulnerability that affects rails
|
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
|
{'CVE-2008-5189'}
|
2022-03-03T05:13:26.680367Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-352'}
|
{'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d', 'http://www.securityfocus.com/bid/32359', 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189', 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing', 'https://github.com/advisories/GHSA-jmgf-p46x-982h', 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk', 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://github.com/rails/rails'}
| null |
RubyGems
|
GHSA-pxr8-w3jq-rcwj
|
Moderate severity vulnerability that affects rails_admin
|
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
|
{'CVE-2017-12098'}
|
2022-03-03T05:13:37.032009Z
|
2018-03-05T19:37:23Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450', 'http://www.securityfocus.com/bid/102486'}
| null |
RubyGems
|
GHSA-9fh3-vh3h-q4g3
|
Moderate severity vulnerability that affects activesupport
|
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
|
{'CVE-2011-2932'}
|
2022-03-03T05:12:38.166203Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://bugzilla.redhat.com/show_bug.cgi?id=731435', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html', 'http://secunia.com/advisories/45917', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-9fh3-vh3h-q4g3'}
| null |
RubyGems
|
GHSA-x457-cw4h-hq5f
|
High severity vulnerability that affects json
|
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
|
{'CVE-2013-0269'}
|
2022-03-03T05:14:17.891767Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010', 'http://www.ubuntu.com/usn/USN-1733-1', 'http://www.openwall.com/lists/oss-security/2013/02/11/8', 'http://rhn.redhat.com/errata/RHSA-2013-1028.html', 'http://www.openwall.com/lists/oss-security/2013/02/11/7', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://github.com/advisories/GHSA-x457-cw4h-hq5f', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html', 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862', 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://rhn.redhat.com/errata/RHSA-2013-1147.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'http://www.osvdb.org/90074', 'http://www.securityfocus.com/bid/57899', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'http://secunia.com/advisories/52902', 'http://secunia.com/advisories/52075', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html', 'http://secunia.com/advisories/52774', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269', 'https://puppet.com/security/cve/cve-2013-0269'}
| null |
RubyGems
|
GHSA-r8fh-hq2p-7qhq
|
High severity vulnerability that affects activerecord
|
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting.
|
{'CVE-2014-3483'}
|
2022-03-03T05:14:04.043551Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-89'}
|
{'http://www.debian.org/security/2014/dsa-2982', 'https://github.com/advisories/GHSA-r8fh-hq2p-7qhq', 'http://openwall.com/lists/oss-security/2014/07/02/5', 'http://rhn.redhat.com/errata/RHSA-2014-0877.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483', 'http://www.securityfocus.com/bid/68341', 'http://secunia.com/advisories/60214', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J', 'http://secunia.com/advisories/59971'}
| null |
RubyGems
|
GHSA-jppv-gw3r-w3q8
|
OS Command Injection in Rake
|
There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
|
{'CVE-2020-8130'}
|
2022-03-03T05:13:45.803499Z
|
2020-02-28T16:54:36Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://usn.ubuntu.com/4295-1/', 'https://hackerone.com/reports/651518', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130', 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/'}
| null |
RubyGems
|
GHSA-mgx3-27hr-mfgp
|
High severity vulnerability that affects httparty
|
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
|
{'CVE-2013-1801'}
|
2022-03-03T05:14:10.324559Z
|
2017-10-24T18:33:37Z
|
HIGH
| null | null |
{'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/jnunemaker/httparty', 'https://github.com/advisories/GHSA-mgx3-27hr-mfgp', 'https://bugzilla.redhat.com/show_bug.cgi?id=917229', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801', 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031', 'http://www.securityfocus.com/bid/58260'}
| null |
RubyGems
|
GHSA-cff7-6h4q-q5pj
|
Lacked element count during splitting of JWE string
|
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
|
{'CVE-2019-18848'}
|
2022-05-04T02:05:31.585529Z
|
2019-11-14T15:25:51Z
|
HIGH
| null |
{'CWE-20', 'CWE-287'}
|
{'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18848', 'https://github.com/nov/json-jwt', 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'}
| null |
RubyGems
|
GHSA-959j-5g9v-3fpq
|
Low severity vulnerability that affects paratrooper-newrelic
|
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
|
{'CVE-2014-1234'}
|
2022-03-03T05:13:54.593520Z
|
2017-10-24T18:33:36Z
|
LOW
| null |
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-959j-5g9v-3fpq', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234', 'http://openwall.com/lists/oss-security/2014/01/08/2', 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}
| null |
RubyGems
|
GHSA-85r7-w5mv-c849
|
Moderate severity vulnerability that affects rack
|
rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
|
{'CVE-2013-0262'}
|
2022-03-03T05:14:17.530513Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://gist.github.com/rentzsch/4736940', 'https://bugzilla.redhat.com/show_bug.cgi?id=909072', 'https://github.com/advisories/GHSA-85r7-w5mv-c849', 'http://rack.github.com/', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack', 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56', 'https://bugzilla.redhat.com/show_bug.cgi?id=909071', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262', 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30', 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ', 'http://secunia.com/advisories/52033', 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ'}
| null |
RubyGems
|
GHSA-wh98-p28r-vrc9
|
Exposure of information in Action Pack
|
### Impact
Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with `ActiveSupport::CurrentAttributes`.
Upgrading to the FIXED versions of Rails will ensure mitigation of this issue even in the context of a buggy webserver or middleware implementation.
### Patches
This has been fixed in Rails 7.0.2.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2.
### Workarounds
Upgrading is highly recommended, but to work around this problem the following middleware can be used:
```ruby
class GuardedExecutor < ActionDispatch::Executor
def call(env)
ensure_completed!
super
end
private
def ensure_completed!
@executor.new.complete! if @executor.active?
end
end
# Ensure the guard is inserted before ActionDispatch::Executor
Rails.application.configure do
config.middleware.swap ActionDispatch::Executor, GuardedExecutor, executor
end
```
|
{'CVE-2022-23633'}
|
2022-03-03T05:13:17.293702Z
|
2022-02-11T20:49:14Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da', 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9', 'https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016', 'https://github.com/rails/rails', 'https://rubyonrails.org/2022/2/11/Rails-7-0-2-2-6-1-4-6-6-0-4-6-and-5-2-6-2-have-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23633', 'http://www.openwall.com/lists/oss-security/2022/02/11/5'}
| null |
RubyGems
|
GHSA-5jcf-c5rg-rmm8
|
High severity vulnerability that affects paperclip
|
Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources.
|
{'CVE-2017-0889'}
|
2022-03-03T05:12:43.140731Z
|
2018-01-22T13:31:34Z
|
HIGH
| null |
{'CWE-918'}
|
{'https://hackerone.com/reports/209430', 'https://github.com/thoughtbot/paperclip/pull/2435', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889', 'https://github.com/advisories/GHSA-5jcf-c5rg-rmm8', 'https://hackerone.com/reports/713'}
| null |
RubyGems
|
GHSA-84j7-475p-hp8v
|
HTTP Response Splitting in Puma
|
In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header,
an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content,
such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting.
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server.
This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
|
{'CVE-2020-5247'}
|
2022-03-03T05:13:06.415138Z
|
2020-02-28T16:53:55Z
|
MODERATE
| null |
{'CWE-113'}
|
{'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v'}
| null |
RubyGems
|
GHSA-gp82-xr77-88f4
|
Moderate severity vulnerability that affects radiant
|
There are multiple Persistent XSS vulnerabilities in Radiant CMS 1.1.4. They affect Personal Preferences (Name and Username) and Configuration (Site Title, Dev Site Domain, Page Parts, and Page Fields).
|
{'CVE-2018-7261'}
|
2021-09-13T12:38:11Z
|
2018-07-27T17:08:29Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-gp82-xr77-88f4', 'http://www.securityfocus.com/archive/1/541798/100/0/threaded', 'http://www.securityfocus.com/bid/103080', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7261'}
| null |
RubyGems
|
GHSA-4q53-fqhc-cr46
|
Low severity vulnerability that affects ember-source
|
Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute.
|
{'CVE-2014-0046'}
|
2022-03-03T05:13:45.961401Z
|
2018-08-28T22:33:42Z
|
LOW
| null |
{'CWE-79'}
|
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242', 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ', 'http://secunia.com/advisories/56965', 'http://www.securityfocus.com/bid/65579', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046', 'http://www.openwall.com/lists/oss-security/2014/02/14/6', 'https://github.com/advisories/GHSA-4q53-fqhc-cr46', 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html'}
| null |
RubyGems
|
GHSA-6mq2-37j5-w6r6
|
Moderate severity vulnerability that affects webrick
|
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
|
{'CVE-2009-4492'}
|
2022-03-12T00:30:12.784581Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-20'}
|
{'http://secunia.com/advisories/37949', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492', 'http://www.redhat.com/support/errata/RHSA-2011-0908.html', 'http://www.redhat.com/support/errata/RHSA-2011-0909.html', 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection', 'http://www.securityfocus.com/archive/1/508830/100/0/threaded', 'http://www.vupen.com/english/advisories/2010/0089', 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6', 'http://www.securityfocus.com/bid/37710', 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt', 'http://securitytracker.com/id?1023429'}
| null |
RubyGems
|
GHSA-rwpr-83g3-96g7
|
Cross-site scripting in padrino-contrib
|
The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption.
|
{'CVE-2019-16145'}
|
2022-03-03T05:12:53.238757Z
|
2019-09-23T18:33:07Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/padrino/padrino-contrib/pull/35', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145'}
| null |
RubyGems
|
GHSA-f7p5-w2cr-7cp7
|
High severity vulnerability that affects puppet
|
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
|
{'CVE-2013-3567'}
|
2022-03-03T05:12:53.010963Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-f7p5-w2cr-7cp7', 'http://secunia.com/advisories/54429', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html', 'http://www.debian.org/security/2013/dsa-2715', 'http://www.ubuntu.com/usn/USN-1886-1', 'https://puppetlabs.com/security/cve/cve-2013-3567/', 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html'}
| null |
RubyGems
|
GHSA-pjj4-w39g-pw54
|
Ox gem crashes due to a crafted input
|
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
|
{'CVE-2017-15928'}
|
2022-04-25T22:17:01.283452Z
|
2017-11-21T18:26:40Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-pjj4-w39g-pw54', 'https://github.com/ohler55/ox/issues/194', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928', 'https://github.com/ohler55/ox', 'https://rubygems.org/gems/ox/versions/2.8.0'}
| null |
RubyGems
|
GHSA-7wjx-3g7j-8584
|
Denial of Service in Action Controller Token Authentication
|
Impact
------
Impacted code uses `authenticate_or_request_with_http_token` or
`authenticate_with_http_token` for request authentication. Impacted code will
look something like this:
```
class PostsController < ApplicationController
before_action :authenticate
private
def authenticate
authenticate_or_request_with_http_token do |token, options|
# ...
end
end
end
```
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around
the issue:
```ruby
module ActionController::HttpAuthentication::Token
AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 5-2-http-authentication-dos.patch - Patch for 5.2 series
* 6-0-http-authentication-dos.patch - Patch for 6.0 series
* 6-1-http-authentication-dos.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as soon
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Credits
-------
Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!
|
{'CVE-2021-22904'}
|
2022-03-03T05:13:31.543883Z
|
2021-05-05T19:49:12Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/rails/rails/releases/tag/v6.1.3.2', 'https://github.com/rails/rails/releases/tag/v6.0.3.7', 'https://github.com/rails/rails/releases/tag/v5.2.4.6', 'https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869', 'https://security.netapp.com/advisory/ntap-20210805-0009/', 'https://github.com/rails/rails', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22904', 'https://groups.google.com/g/rubyonrails-security/c/Pf1TjkOBdyQ', 'https://github.com/rails/rails/releases/tag/v5.2.6', 'https://hackerone.com/reports/1101125'}
| null |
RubyGems
|
GHSA-xwr3-fmgj-mmfr
|
Moderate severity vulnerability that affects bio-basespace-sdk
|
The put_call function in the API client (api/api_client.rb) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the API_KEY on the command line, which allows remote attackers to obtain sensitive information by listing the processes.
|
{'CVE-2013-7111'}
|
2022-03-03T05:14:06.185702Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-200'}
|
{'http://www.openwall.com/lists/oss-security/2013/12/14/2', 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr', 'http://www.openwall.com/lists/oss-security/2013/12/15/5', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111', 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html'}
| null |
RubyGems
|
GHSA-c7j7-p5jq-26ff
|
Low severity vulnerability that affects passenger
|
Phusion Passenger before 4.0.38 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file.
|
{'CVE-2014-1831'}
|
2022-03-03T05:13:06.506859Z
|
2018-10-10T17:29:20Z
|
LOW
| null | null |
{'https://github.com/phusion/passenger/commit/34b1087870c2', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'https://github.com/phusion/passenger', 'https://github.com/advisories/GHSA-c7j7-p5jq-26ff', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1831', 'http://openwall.com/lists/oss-security/2014/01/28/8', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html'}
| null |
RubyGems
|
GHSA-8c56-cpmw-89x7
|
Out-of-bounds read in nokogiri
|
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2.
|
{'CVE-2017-9050'}
|
2022-03-03T05:13:53.907890Z
|
2017-12-13T21:38:24Z
|
HIGH
| null |
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-8c56-cpmw-89x7', 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'http://www.securityfocus.com/bid/98568', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050', 'https://security.gentoo.org/glsa/201711-01', 'http://www.debian.org/security/2017/dsa-3952', 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}
| null |
RubyGems
|
GHSA-33pp-3763-mrfp
|
Moderate severity vulnerability that affects sprockets
|
Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
|
{'CVE-2014-7819'}
|
2022-03-03T05:13:31.300151Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-33pp-3763-mrfp', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html'}
| null |
RubyGems
|
GHSA-w6rc-q387-vpgq
|
Moderate severity vulnerability that affects passenger
|
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
|
{'CVE-2013-4136'}
|
2022-03-03T05:12:38.652146Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-59'}
|
{'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://github.com/phusion/passenger', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b', 'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://www.openwall.com/lists/oss-security/2013/07/16/6'}
| null |
RubyGems
|
GHSA-49r3-2549-3633
|
omniauth-apple allows attacker to fake their email address during authentication
|
### Impact
This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users.
For example, an application using omniauth-apple with the following code will be impacted:
```ruby
def omniauth_callback
auth_hash = request.env['omniauth.auth']
@authenticated_user = User.find_by(email: auth_hash.info.email)
end
```
Applications not using `info.email` for identification but are instead using the `uid` field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of `info.email` is being used for other purposes.
### Patches
Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.
### Workarounds
If unable to upgrade to a patched version, monkey patching `OmniAuth::Strategies::Apple#email` as follows is advised as a workaround:
```ruby
module OmniAuth
module Strategies
class Apple
def email
id_info['email']
end
end
end
end
```
|
{'CVE-2020-26254'}
|
2022-03-03T05:13:18.653035Z
|
2020-12-08T14:18:19Z
|
LOW
| null |
{'CWE-290'}
|
{'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254'}
| null |
RubyGems
|
GHSA-688c-3x49-6rqj
|
Moderate severity vulnerability that affects rack-protection
|
Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
|
{'CVE-2018-1000119'}
|
2022-03-03T05:12:58.358411Z
|
2018-03-07T22:22:22Z
|
MODERATE
| null |
{'CWE-203'}
|
{'https://github.com/sinatra/rack-protection/pull/98', 'https://github.com/sinatra/rack-protection', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://access.redhat.com/errata/RHSA-2018:1060'}
| null |
RubyGems
|
GHSA-fqrr-rrwg-69pv
|
Low severity vulnerability that affects paratrooper-pingdom
|
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
|
{'CVE-2014-1233'}
|
2022-03-03T05:13:16.698294Z
|
2017-10-24T18:33:36Z
|
LOW
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-1233', 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html', 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv', 'http://openwall.com/lists/oss-security/2014/01/08/1'}
| null |
RubyGems
|
GHSA-q97v-764g-r2rp
|
High severity vulnerability that affects gollum and gollum-lib
|
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.
|
{'CVE-2014-9489'}
|
2022-03-03T05:13:49.192780Z
|
2017-11-16T01:47:37Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.openwall.com/lists/oss-security/2015/01/03/19', 'https://github.com/gollum/gollum/issues/913', 'http://www.securityfocus.com/bid/71499', 'https://github.com/gollum/gollum', 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}
| null |
RubyGems
|
GHSA-fq42-c5rg-92c2
|
Vulnerable dependencies in Nokogiri
|
### Summary
Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies:
- vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news)
- vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome.org/sources/libxslt/1.1/libxslt-1.1.35.news)
Those library versions address the following upstream CVEs:
- libxslt: [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560) (CVSS 8.8, High severity)
- libxml2: [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308) (Unspecified severity, see more information below)
Those library versions also address numerous other issues including performance improvements, regression fixes, and bug fixes, as well as memory leaks and other use-after-free issues that were not assigned CVEs.
Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.2`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements.
### Mitigation
Upgrade to Nokogiri `>= 1.13.2`.
Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link an older version Nokogiri against external libraries libxml2 `>= 2.9.13` and libxslt `>= 1.1.35`, which will also address these same CVEs.
### Impact
#### libxslt [CVE-2021-30560](https://nvd.nist.gov/vuln/detail/CVE-2021-30560)
- CVSS3 score: 8.8 (High)
- Fixed by https://gitlab.gnome.org/GNOME/libxslt/-/commit/50f9c9c
All versions of libxslt prior to v1.1.35 are affected.
Applications using **untrusted** XSL stylesheets to transform XML are vulnerable to a denial-of-service attack and should be upgraded immediately.
#### libxml2 [CVE-2022-23308](https://nvd.nist.gov/vuln/detail/CVE-2022-23308)
- As of the time this security advisory was published, there is no officially published information available about this CVE's severity. The above NIST link does not yet have a published record, and the libxml2 maintainer has declined to provide a severity score.
- Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/652dd12
- Further explanation is at https://mail.gnome.org/archives/xml/2022-February/msg00015.html
The upstream commit and the explanation linked above indicate that an application may be vulnerable to a denial of service, memory disclosure, or code execution if it parses an **untrusted** document with parse options `DTDVALID` set to true, and `NOENT` set to false.
An analysis of these parse options:
- While `NOENT` is off by default for Document, DocumentFragment, Reader, and Schema parsing, it is on by default for XSLT (stylesheet) parsing in Nokogiri v1.12.0 and later.
- `DTDVALID` is an option that Nokogiri does not set for any operations, and so this CVE applies only to applications setting this option explicitly.
It seems reasonable to assume that any application explicitly setting the parse option `DTDVALID` when parsing **untrusted** documents is vulnerable and should be upgraded immediately.
| null |
2022-03-03T05:13:22.187480Z
|
2022-02-25T20:32:09Z
|
HIGH
| null |
{'CWE-416'}
|
{'https://github.com/sparklemotion/nokogiri/', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2'}
| null |
RubyGems
|
GHSA-m2q3-53fq-7h66
|
Moderate severity vulnerability that affects gollum
|
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
|
{'CVE-2015-7314'}
|
2022-03-03T05:12:35.175360Z
|
2018-08-28T22:33:51Z
|
MODERATE
| null |
{'CWE-200'}
|
{'http://www.openwall.com/lists/oss-security/2015/09/22/12', 'https://github.com/gollum/gollum/issues/1070', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'https://github.com/gollum/gollum', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7314'}
| null |
RubyGems
|
GHSA-rfmf-rx8w-935w
|
High severity vulnerability that affects sounder
|
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
|
{'CVE-2013-5647'}
|
2022-03-03T05:13:53.103245Z
|
2017-10-24T18:33:37Z
|
HIGH
| null |
{'CWE-94'}
|
{'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html', 'https://github.com/advisories/GHSA-rfmf-rx8w-935w', 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}
| null |
RubyGems
|
GHSA-cf36-985g-v73c
|
Moderate severity vulnerability that affects omniauth-facebook
|
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
|
{'CVE-2013-4562'}
|
2022-03-03T05:13:58.524578Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-352'}
|
{'http://www.osvdb.org/99693', 'https://github.com/mkdynamic/omniauth-faceboo', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562', 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://seclists.org/oss-sec/2013/q4/264', 'http://seclists.org/oss-sec/2013/q4/267', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt'}
| null |
RubyGems
|
GHSA-fgmx-8h93-26fh
|
Moderate severity vulnerability that affects omniauth-oauth2
|
Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
|
{'CVE-2012-6134'}
|
2022-03-03T05:12:43.022623Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://gist.github.com/homakov/3673012', 'https://github.com/Shopify/omniauth-shopify-oauth2', 'https://github.com/intridea/omniauth-oauth2/pull/25', 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1', 'http://seclists.org/oss-sec/2013/q1/304', 'https://github.com/advisories/GHSA-fgmx-8h93-26fh', 'http://rubysec.github.io/advisories/CVE-2012-6134/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}
| null |
RubyGems
|
GHSA-7g65-ghrg-hpf5
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
|
{'CVE-2012-3465'}
|
2022-03-03T05:13:40.733744Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://secunia.com/advisories/50694', 'https://github.com/advisories/GHSA-7g65-ghrg-hpf5', 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}
| null |
RubyGems
|
GHSA-m7fq-cf8q-35q7
|
High severity vulnerability that affects crack
|
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
|
{'CVE-2013-1800'}
|
2022-03-03T05:12:56.495744Z
|
2017-10-24T18:33:37Z
|
HIGH
| null | null |
{'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html', 'http://secunia.com/advisories/52897', 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}
| null |
RubyGems
|
GHSA-9qj7-jvg4-qr2x
|
Moderate severity vulnerability that affects passenger
|
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in /tmp/ before it is used by the gem.
|
{'CVE-2013-2119'}
|
2022-03-03T05:12:42.468673Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null | null |
{'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119', 'https://bugzilla.redhat.com/show_bug.cgi?id=892813', 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}
| null |
RubyGems
|
GHSA-fr32-gr5c-xq5c
|
Escape sequence injection in RubyGems
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
|
{'CVE-2019-8321'}
|
2022-03-03T05:13:46.723382Z
|
2019-06-20T16:06:04Z
|
HIGH
| null |
{'CWE-88'}
|
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321', 'https://hackerone.com/reports/317330', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}
| null |
RubyGems
|
GHSA-3j95-fjv2-3m4p
|
CSS Injection in Chartkick gem
|
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
|
{'CVE-2020-16254'}
|
2022-03-03T05:13:43.419894Z
|
2020-08-12T14:29:15Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/ankane/chartkick'}
| null |
RubyGems
|
GHSA-mq35-wqvf-r23c
|
Sinatra has XSS via 400 Bad Request page via params parser exception
|
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
|
{'CVE-2018-11627'}
|
2022-04-26T18:17:15.940159Z
|
2018-06-05T21:32:06Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://access.redhat.com/errata/RHSA-2019:0315', 'https://github.com/advisories/GHSA-mq35-wqvf-r23c', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://github.com/sinatra/sinatra/issues/1428', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://github.com/sinatra/sinatra'}
| null |
RubyGems
|
GHSA-7322-9mx6-5j2m
|
High severity vulnerability that affects redcarpet
|
Stack-based buffer overflow in the header_anchor function in the HTML renderer in Redcarpet before 3.3.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
|
{'CVE-2015-5147'}
|
2022-03-03T05:12:54.345182Z
|
2018-08-15T20:04:30Z
|
HIGH
| null |
{'CWE-119'}
|
{'https://github.com/vmg/redcarpet', 'http://www.securityfocus.com/bid/75508', 'https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5147', 'http://www.openwall.com/lists/oss-security/2015/06/30/10', 'http://www.openwall.com/lists/oss-security/2015/06/29/3', 'https://github.com/advisories/GHSA-7322-9mx6-5j2m'}
| null |
RubyGems
|
GHSA-qv8p-v9qw-wc7g
|
Moderate severity vulnerability that affects activesupport
|
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
|
{'CVE-2012-1098'}
|
2022-03-03T05:13:09.619817Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=799275', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098', 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-qv8p-v9qw-wc7g', 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}
| null |
RubyGems
|
GHSA-6fcq-3cm2-j3j5
|
Kcapifony gem for Ruby places database user passwords on the command line
|
lib/ksymfony1.rb in the kcapifony gem 2.1.6 for Ruby places database user passwords on the (1) mysqldump, (2) pg_dump, (3) mysql, and (4) psql command lines, which allows local users to obtain sensitive information by listing the processes.
|
{'CVE-2014-5001'}
|
2022-04-26T18:33:01.942616Z
|
2018-07-23T19:50:11Z
|
HIGH
| null |
{'CWE-200'}
|
{'http://www.openwall.com/lists/oss-security/2014/07/07/21', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5001', 'http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html', 'https://github.com/advisories/GHSA-6fcq-3cm2-j3j5', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
| null |
RubyGems
|
GHSA-m42x-37p3-fv5w
|
Circumvention of file size limits in ActiveStorage
|
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a
direct file upload to be modified by an end user.
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a
new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily
until such time as the application can be upgraded.
|
{'CVE-2020-8162'}
|
2022-03-03T05:14:18.028590Z
|
2020-05-26T15:09:48Z
|
LOW
| null |
{'CWE-602'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ', 'https://groups.google.com/g/rubyonrails-security/c/PjU3946mreQ', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2020-8162.yml', 'https://hackerone.com/reports/789579', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8162', 'https://www.debian.org/security/2020/dsa-4766'}
| null |
RubyGems
|
GHSA-8qrh-h9m2-5fvf
|
Moderate severity vulnerability that affects rails
|
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
|
{'CVE-2009-3009'}
|
2022-03-03T05:13:20.246903Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.vupen.com/english/advisories/2009/2544', 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063', 'http://secunia.com/advisories/36600', 'http://support.apple.com/kb/HT4077', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://www.osvdb.org/57666', 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source', 'http://www.securityfocus.com/bid/36278', 'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails', 'http://www.debian.org/security/2009/dsa-1887', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036', 'http://securitytracker.com/id?1022824', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009', 'http://secunia.com/advisories/36717', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}
| null |
RubyGems
|
GHSA-58r4-h6v8-jcvm
|
Regression in JWT Signature Validation
|
### Overview
Versions after and including `2.3.0` are improperly validating the JWT token signature when using the `JWTValidator.verify` method. Improper validation of the JWT token signature when not using the default Authorization Code Flow can allow an attacker to bypass authentication and authorization.
### Am I affected?
You are affected by this vulnerability if all of the following conditions apply:
- You are using `omniauth-auth0`.
- You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow.
### How to fix that?
Upgrade to version `2.4.1`.
### Will this update impact my users?
The fix provided in this version will not affect your users.
|
{'CVE-2020-15240'}
|
2022-03-03T05:14:16.039069Z
|
2020-11-03T02:31:38Z
|
HIGH
| null |
{'CWE-347', 'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15240', 'https://github.com/auth0/omniauth-auth0/commit/fd3a14f4ccdfbc515d1121d6378ff88bf55a7a7a', 'https://github.com/auth0/omniauth-auth0/security/advisories/GHSA-58r4-h6v8-jcvm', 'https://github.com/auth0/omniauth-auth0', 'https://rubygems.org/gems/omniauth-auth0'}
| null |
RubyGems
|
GHSA-jxjr-5h69-qw3w
|
Moderate severity vulnerability that affects nokogiri
|
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
|
{'CVE-2015-7499'}
|
2022-03-03T05:13:29.255791Z
|
2018-09-17T21:57:38Z
|
MODERATE
| null |
{'CWE-119'}
|
{'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da', 'http://rhn.redhat.com/errata/RHSA-2016-1089.html', 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html', 'https://support.apple.com/HT206166', 'http://rhn.redhat.com/errata/RHSA-2015-2549.html', 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc', 'http://www.debian.org/security/2015/dsa-3430', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'http://www.ubuntu.com/usn/USN-2834-1', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html', 'http://xmlsoft.org/news.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html', 'https://support.apple.com/HT206167', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172', 'https://support.apple.com/HT206169', 'http://www.securitytracker.com/id/1034243', 'https://support.apple.com/HT206168', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499', 'http://marc.info/?l=bugtraq&m=145382616617563&w=2', 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html', 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html', 'https://security.gentoo.org/glsa/201701-37', 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://www.securityfocus.com/bid/79509', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html'}
| null |
RubyGems
|
GHSA-8727-m6gj-mc37
|
Possible Strong Parameters Bypass in ActionPack
|
There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 4.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Applications that use this return value may be
inadvertently use untrusted user input.
Impacted code will look something like this:
```
def update
# Attacker has included the parameter: `{ is_admin: true }`
User.update(clean_up_params)
end
def clean_up_params
params.each { |k, v| SomeModel.check(v) if k == :name }
end
```
Note the mistaken use of `each` in the `clean_up_params` method in the above
example.
Workarounds
-----------
Do not use the return values of `each`, `each_value`, or `each_pair` in your
application.
|
{'CVE-2020-8164'}
|
2022-03-03T05:13:52.237370Z
|
2020-05-26T15:09:16Z
|
MODERATE
| null |
{'CWE-502'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00107.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00093.html', 'https://hackerone.com/reports/292797', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00089.html', 'https://groups.google.com/g/rubyonrails-security/c/f6ioe4sdpbY', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8164', 'https://www.debian.org/security/2020/dsa-4766'}
| null |
RubyGems
|
GHSA-fcqf-h4h4-695m
|
Moderate severity vulnerability that affects actionpack
|
CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
|
{'CVE-2011-3186'}
|
2022-03-03T05:12:52.686804Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-94'}
|
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.debian.org/security/2011/dsa-2301', 'https://bugzilla.redhat.com/show_bug.cgi?id=732156', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186', 'https://github.com/advisories/GHSA-fcqf-h4h4-695m'}
| null |
RubyGems
|
GHSA-q6cw-2553-7837
|
Moderate severity vulnerability that affects newrelic_rpm
|
Ruby agent 3.2.0 through 3.5.2 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
|
{'CVE-2013-0284'}
|
2022-03-03T05:12:29.612828Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://newrelic.com/docs/ruby/ruby-agent-security-notification', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284', 'http://seclists.org/oss-sec/2013/q1/304', 'https://github.com/advisories/GHSA-q6cw-2553-7837'}
| null |
RubyGems
|
GHSA-29gr-w57f-rpfw
|
Moderate severity vulnerability that affects actionpack
|
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
|
{'CVE-2014-7818'}
|
2022-03-03T05:13:14.618922Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7818', 'https://github.com/advisories/GHSA-29gr-w57f-rpfw', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ', 'https://puppet.com/security/cve/cve-2014-7829'}
| null |
RubyGems
|
GHSA-jrfj-98qg-qjgv
|
Denial of service in sidekiq
|
In api.rb in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
|
{'CVE-2022-23837'}
|
2022-03-11T20:16:49.892671Z
|
2022-01-27T14:42:37Z
|
HIGH
| null |
{'CWE-400', 'CWE-770'}
|
{'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html', 'https://github.com/rubysec/ruby-advisory-db/pull/495', 'https://github.com/TUTUMSPACE/exploits/blob/main/sidekiq.md', 'https://github.com/mperham/sidekiq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23837'}
| null |
RubyGems
|
GHSA-g397-v4w5-4m79
|
Command injection in cocoapods-downloader
|
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
{'CVE-2022-21223'}
|
2022-04-12T15:55:10.852941Z
|
2022-04-02T00:00:13Z
|
HIGH
| null |
{'CWE-74', 'CWE-88'}
|
{'https://github.com/CocoaPods/cocoapods-downloader/pull/127', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414280', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223', 'https://github.com/CocoaPods/cocoapods-downloader'}
| null |
RubyGems
|
GHSA-7vxr-6cxg-j3x8
|
OS Command Injection in ftpd
|
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
|
{'CVE-2013-2512'}
|
2022-03-03T05:13:15.551362Z
|
2021-10-12T22:33:59Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512', 'http://vapidlabs.com/advisory.php?v=34', 'https://github.com/wconrad/ftpd'}
| null |
RubyGems
|
GHSA-j5rj-g695-342r
|
Moderate severity vulnerability that affects fat_free_crm
|
FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. This attack appear to be exploitable via Content with Javascript payload will be executed on end user browsers when they visit the page. This vulnerability appears to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, 0.14.2.
|
{'CVE-2018-1000842'}
|
2022-03-03T05:13:50.305320Z
|
2018-12-20T22:01:54Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-j5rj-g695-342r', 'https://github.com/asteinhauser/fat_free_crm/', 'https://github.com/asteinhauser/fat_free_crm/issues/1', 'https://groups.google.com/forum/#!topic/fat-free-crm-users/TxsdZXSe7Jc', 'https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000842', 'https://github.com/asteinhauser/fat_free_crm/commit/306f940b26ccf3f406665f07bece1229a7a5dcfa'}
| null |
RubyGems
|
GHSA-v9v4-7jp6-8c73
|
Moderate severity vulnerability that affects rails
|
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
|
{'CVE-2011-2197'}
|
2022-03-03T05:13:37.120014Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197', 'https://github.com/advisories/GHSA-v9v4-7jp6-8c73', 'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications', 'http://openwall.com/lists/oss-security/2011/06/13/9', 'http://openwall.com/lists/oss-security/2011/06/09/2', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html', 'http://secunia.com/advisories/44789', 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain', 'https://github.com/rails/rails'}
| null |
RubyGems
|
GHSA-hhwc-8g49-j8jx
|
Incorrect Permission Assignment for Critical Resource in ruby_parser-legacy
|
The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file.
|
{'CVE-2019-18409'}
|
2022-03-03T05:12:48.637526Z
|
2019-10-25T19:41:34Z
|
HIGH
| null |
{'CWE-732'}
|
{'https://github.com/zenspider/ruby_parser-legacy/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18409'}
| null |
RubyGems
|
GHSA-vx9j-46rh-fqr8
|
Moderate severity vulnerability that affects actionview
|
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
|
{'CVE-2016-2097'}
|
2022-03-03T05:13:00.766699Z
|
2017-10-24T18:33:35Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-vx9j-46rh-fqr8', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html', 'http://www.securitytracker.com/id/1035122', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://www.securityfocus.com/bid/83726', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'http://www.debian.org/security/2016/dsa-3509', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}
| null |
RubyGems
|
GHSA-r53w-g4xm-3gc6
|
Cross-site scripting in Haml
|
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
|
{'CVE-2017-1002201'}
|
2022-03-03T05:14:02.155160Z
|
2019-10-21T21:59:13Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/haml/haml/', 'https://security.gentoo.org/glsa/202007-27'}
| null |
RubyGems
|
GHSA-fhj9-cjjh-27vm
|
Critical severity vulnerability that affects activerecord
|
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
|
{'CVE-2013-0277'}
|
2022-03-03T05:14:05.893122Z
|
2017-10-24T18:33:37Z
|
CRITICAL
| null | null |
{'http://www.osvdb.org/90073', 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain', 'http://support.apple.com/kb/HT5784', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277', 'http://www.openwall.com/lists/oss-security/2013/02/11/6', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://securitytracker.com/id?1028109', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://puppet.com/security/cve/cve-2013-0277', 'http://www.debian.org/security/2013/dsa-2620', 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'http://secunia.com/advisories/52112', 'https://github.com/advisories/GHSA-fhj9-cjjh-27vm'}
| null |
RubyGems
|
GHSA-pr3h-jjhj-573x
|
High severity vulnerability that affects sprockets
|
Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.
All users running an affected release should either upgrade or use one of the work arounds immediately.
Workaround:
In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets.
This work around will not be possible in all hosting environments and upgrading is advised.
|
{'CVE-2018-3760'}
|
2022-03-03T05:12:55.724463Z
|
2018-06-20T22:18:58Z
|
HIGH
| null |
{'CWE-22', 'CWE-200'}
|
{'https://github.com/rails/sprockets', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760', 'https://access.redhat.com/errata/RHSA-2018:2745', 'https://www.debian.org/security/2018/dsa-4242', 'https://github.com/advisories/GHSA-pr3h-jjhj-573x', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5fhttps://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ', 'https://access.redhat.com/errata/RHSA-2018:2245'}
| null |
RubyGems
|
GHSA-fcjw-8rhj-gwwc
|
Authentication Bypass in Devise
|
An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.)
|
{'CVE-2019-16109'}
|
2022-03-03T05:12:46.189456Z
|
2019-09-11T23:06:57Z
|
HIGH
| null |
{'CWE-284'}
|
{'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1', 'https://github.com/plataformatec/devise/pull/5132', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109', 'https://github.com/plataformatec/devise/issues/5071'}
| null |
RubyGems
|
GHSA-xmgj-5fh3-xjmm
|
Path traversal when MessageBus::Diagnostics is enabled
|
### Impact
Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels.
### Patches
Patched in 3.3.7.
### Workarounds
Disable MessageBus::Diagnostics in production like environments.
|
{'CVE-2021-43840'}
|
2022-03-03T05:13:02.780448Z
|
2021-12-17T19:59:13Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba', 'https://github.com/discourse/message_bus', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840'}
| null |
RubyGems
|
GHSA-w3j4-76qw-wwjm
|
Older releases of better_errors open to Cross-Site Request Forgery attack
|
### Impact
better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks.
_As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._
### Patches
Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".
### Workarounds
There are no known workarounds to mitigate the risk of using older releases of better_errors.
### References
- Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/)
### For more information
If you have any questions or comments about this advisory, please
- Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507)
- Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
|
{'CVE-2021-39197'}
|
2022-03-03T05:14:16.248141Z
|
2021-09-07T23:08:24Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/better_errors/discussions/507', 'https://github.com/BetterErrors/better_errors', 'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://github.com/BetterErrors/better_errors/pull/474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197'}
| null |
RubyGems
|
GHSA-xq5j-gw7f-jgj8
|
CSRF Vulnerability in rails-ujs
|
There is an vulnerability in rails-ujs that allows attackers to send
CSRF tokens to wrong domains.
Versions Affected: rails <= 6.0.3
Not affected: Applications which don't use rails-ujs.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or
the action attribute of a form tag that will trigger a POST action, the attacker can set the
href or action to a cross-origin URL, and the CSRF token will be sent.
Workarounds
-----------
To work around this problem, change code that allows users to control the href attribute of an anchor
tag or the action attribute of a form tag to filter the user parameters.
For example, code like this:
link_to params
to code like this:
link_to filtered_params
def filtered_params
# Filter just the parameters that you trust
end
|
{'CVE-2020-8167'}
|
2022-03-03T05:14:09.149254Z
|
2020-07-07T16:34:10Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml', 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0', 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8167', 'https://hackerone.com/reports/189878', 'https://www.debian.org/security/2020/dsa-4766'}
| null |
RubyGems
|
GHSA-mm33-5vfq-3mm3
|
XSS Vulnerability in Action Pack
|
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been
assigned the CVE identifier CVE-2022-22577.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
CSP headers were only sent along with responses that Rails considered as
"HTML" responses. This left API requests without CSP headers, which could
possibly expose users to XSS attacks.
## Releases
The FIXED releases are available at the normal locations.
## Workarounds
Set a CSP for your API responses manually.
|
{'CVE-2022-22577'}
|
2022-04-27T23:16:59.053710Z
|
2022-04-27T22:28:59Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI', 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml', 'https://github.com/rails/rails/pull/44635', 'https://github.com/rails/rails'}
| null |
RubyGems
|
GHSA-7627-mp87-jf6q
|
Command injection in cocoapods-downloader
|
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
{'CVE-2022-24440'}
|
2022-04-12T15:46:03.452200Z
|
2022-04-02T00:00:13Z
|
HIGH
| null |
{'CWE-74', 'CWE-88'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24440', 'https://github.com/CocoaPods/cocoapods-downloader/pull/124', 'https://github.com/CocoaPods/cocoapods-downloader/pull/128', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278', 'https://github.com/CocoaPods/cocoapods-downloader'}
| null |
RubyGems
|
GHSA-333g-rpr4-7hxq
|
Backdoor / Malicious code
|
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x.
Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory.
These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.
|
{'CVE-2019-15224'}
|
2022-04-01T14:17:08.603600Z
|
2019-08-20T14:29:03Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-15224', 'https://github.com/rest-client/rest-client/issues/713', 'https://rubygems.org/gems/rest-client/versions/'}
| null |
RubyGems
|
GHSA-2xvj-j3qh-x8c3
|
High severity vulnerability that affects private_address_check
|
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
|
{'CVE-2018-3759'}
|
2022-03-03T05:12:45.204597Z
|
2018-07-31T18:13:05Z
|
HIGH
| null |
{'CWE-362'}
|
{'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147', 'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759'}
| null |
RubyGems
|
GHSA-5629-8855-gf4g
|
Authentication Bypass by CSRF Weakness
|
### Impact
The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details.
The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end.
### Patches
For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`.
### Workarounds
Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
### References
- [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions)
* Email us at [security@solidus.io](mailto:security@soliidus.io)
* Contact the core team on [Slack](http://slack.solidus.io/)
| null |
2022-03-07T20:46:57.244494Z
|
2021-11-18T20:12:40Z
|
CRITICAL
| null |
{'CWE-352', 'CWE-305'}
|
{'https://github.com/solidusio/solidus', 'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g', 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}
| null |
RubyGems
|
GHSA-23f7-99jx-m54r
|
Remote code execution in dependabot-core branch names when cloning
|
### Impact
Remote code execution vulnerability in `dependabot-common` and `dependabot-go_modules` when a source branch name contains malicious injectable bash code.
For example, if Dependabot is configured to use the following source branch name: `"/$({curl,127.0.0.1})"`, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository.
When Dependabot is configured to clone the source repository during an update, Dependabot runs a shell command to git clone the repository:
```bash
git clone --no-tags --no-recurse-submodules --depth=1 --branch=<BRANCH> --single-branch <GITHUB_REPO_URL> repo/contents/path
```
Dependabot will always clone the source repository for `go_modules` during the file fetching step and can be configured to clone the repository for other package managers using the `FileFetcher` class from `dependabot-common`.
```ruby
source = Dependabot::Source.new(
provider: "github",
repo: "repo/name",
directory: "/",
branch: "/$({curl,127.0.0.1})",
)
repo_contents_path = "./file/path"
fetcher = Dependabot::FileFetchers.for_package_manager("bundler").
new(source: source, credentials: [],
repo_contents_path: repo_contents_path)
fetcher.clone_repo_contents
```
### Patches
The fix was applied to version `0.125.1`: https://github.com/dependabot/dependabot-core/pull/2727
### Workarounds
Escape the branch name prior to passing it to the `Dependabot::Source` class.
For example using `shellwords`:
```ruby
require "shellwords"
branch = Shellwords.escape("/$({curl,127.0.0.1})")
source = Dependabot::Source.new(
provider: "github",
repo: "repo/name",
directory: "/",
branch: branch,
)
```
|
{'CVE-2020-26222'}
|
2022-03-03T05:13:27.535302Z
|
2020-11-13T15:47:50Z
|
LOW
| null |
{'CWE-74'}
|
{'https://github.com/dependabot/dependabot-core/pull/2727', 'https://github.com/dependabot/dependabot-core/security/advisories/GHSA-23f7-99jx-m54r', 'https://rubygems.org/gems/dependabot-omnibus', 'https://github.com/dependabot/dependabot-core/commit/e089116abbe284425b976f7920e502b8e83a61b5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26222', 'https://rubygems.org/gems/dependabot-common'}
| null |
RubyGems
|
GHSA-rxq3-gm4p-5fj4
|
High severity vulnerability that affects rails
|
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
|
{'CVE-2009-2422'}
|
2022-03-03T05:13:25.883872Z
|
2017-10-24T18:33:38Z
|
HIGH
| null |
{'CWE-287'}
|
{'http://www.vupen.com/english/advisories/2009/1802', 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4', 'http://secunia.com/advisories/35702', 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528', 'http://support.apple.com/kb/HT4077', 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html', 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422', 'http://www.securityfocus.com/bid/35579'}
| null |
RubyGems
|
GHSA-c289-47qf-rvrr
|
Low severity vulnerability that affects easymon
|
easymon version 1.4 and earlier contains a Cross Site Scripting (XSS) vulnerability in Endpoint where monitoring is mounted that can result in Reflected XSS that affects Firefox. Can be used to steal cookies, depending on the cookie settings.. This attack appear to be exploitable via The victim must click on a crafted URL that contains the XSS payload. This vulnerability appears to have been fixed in 1.4.1 and later.
|
{'CVE-2018-1000855'}
|
2022-03-03T05:13:20.796361Z
|
2018-12-21T17:46:03Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/basecamp/easymon/issues/26', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000855', 'https://github.com/advisories/GHSA-c289-47qf-rvrr', 'https://github.com/basecamp/easymon', 'https://github.com/basecamp/easymon/pull/25'}
| null |
RubyGems
|
GHSA-vr8q-g5c7-m54m
|
XXE in Nokogiri
|
### Severity
Nokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N).
### Description
In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks.
This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as **untrusted** by default whenever possible.
Please note that this security fix was pushed into a new minor version, 1.11.x, rather than a patch release to the 1.10.x branch, because it is a breaking change for some schemas and the risk was assessed to be "Low Severity".
### Affected Versions
Nokogiri `<= 1.10.10` as well as prereleases `1.11.0.rc1`, `1.11.0.rc2`, and `1.11.0.rc3`
### Mitigation
There are no known workarounds for affected versions. Upgrade to Nokogiri `1.11.0.rc4` or later.
If, after upgrading to `1.11.0.rc4` or later, you wish to re-enable network access for resolution of external resources (i.e., return to the previous behavior):
1. Ensure the input is trusted. Do not enable this option for untrusted input.
2. When invoking the `Nokogiri::XML::Schema` constructor, pass as the second parameter an instance of `Nokogiri::XML::ParseOptions` with the `NONET` flag turned off.
So if your previous code was:
``` ruby
# in v1.11.0.rc3 and earlier, this call allows resources to be accessed over the network
# but in v1.11.0.rc4 and later, this call will disallow network access for external resources
schema = Nokogiri::XML::Schema.new(schema)
# in v1.11.0.rc4 and later, the following is equivalent to the code above
# (the second parameter is optional, and this demonstrates its default value)
schema = Nokogiri::XML::Schema.new(schema, Nokogiri::XML::ParseOptions::DEFAULT_SCHEMA)
```
Then you can add the second parameter to indicate that the input is trusted by changing it to:
``` ruby
# in v1.11.0.rc3 and earlier, this would raise an ArgumentError
# but in v1.11.0.rc4 and later, this allows resources to be accessed over the network
schema = Nokogiri::XML::Schema.new(trusted_schema, Nokogiri::XML::ParseOptions.new.nononet)
```
### References
- [This issue's public advisory](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m)
- [Original Hackerone report (private)](https://hackerone.com/reports/747489)
- [OWASP description of XXE attack](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing)
- [OWASP description of SSRF attack](https://www.owasp.org/index.php/Server_Side_Request_Forgery)
### Credit
This vulnerability was independently reported by @eric-therond and @gucki.
The Nokogiri maintainers would like to thank [HackerOne](https://hackerone.com/nokogiri) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to us.
|
{'CVE-2020-26247'}
|
2022-03-03T05:14:07.122463Z
|
2020-12-30T18:35:06Z
|
MODERATE
| null |
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26247', 'https://rubygems.org/gems/nokogiri', 'https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html', 'https://hackerone.com/reports/747489', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4', 'https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03'}
| null |
RubyGems
|
GHSA-cf3w-g86h-35x4
|
Code Injection vulnerability in CarrierWave::RMagick
|
### Impact
[CarrierWave::RMagick](https://github.com/carrierwaveuploader/carrierwave/blob/master/lib/carrierwave/processing/rmagick.rb) has a Code Injection vulnerability. Its `#manipulate!` method inappropriately evals the content of mutation option(`:read`/`:write`), allowing attackers to craft a string that can be executed as a Ruby code.
If an application developer supplies untrusted inputs to the option, it will lead to remote code execution(RCE).
(But supplying untrusted input to the option itself is dangerous even in absence of this vulnerability, since is prone to DoS vulnerability - attackers can try to consume massive amounts of memory by resizing to a very large dimension)
### Proof of Concept
```ruby
class MyUploader < CarrierWave::Uploader::Base
include CarrierWave::RMagick
end
MyUploader.new.manipulate!({ read: { density: "1 }; p 'Hacked'; {" }}) # => shows "Hacked"
```
### Patches
Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2).
### Workarounds
Stop supplying untrusted input to `#manipulate!`'s mutation option.
### References
[Code Injection Software Attack](https://owasp.org/www-community/attacks/Code_Injection)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave)
* Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
|
{'CVE-2021-21305'}
|
2022-04-27T20:00:06.549782Z
|
2021-02-08T19:16:39Z
|
HIGH
| null |
{'CWE-94', 'CWE-74'}
|
{'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-cf3w-g86h-35x4', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://rubygems.org/gems/carrierwave', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/commit/387116f5c72efa42bc3938d946b4c8d2f22181b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21305', 'https://github.com/carrierwaveuploader/carrierwave'}
| null |
RubyGems
|
GHSA-cxf7-qrc5-9446
|
Remote shell execution vulnerability in image_processing
|
### Impact
When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:
```rb
ImageProcessing::Vips.apply({ system: "echo EXECUTED" })
#>> EXECUTED
```
This method is called internally by Active Storage variants, so Active Storage is vulnerable as well.
### Patches
The vulnerability has been fixed in version 1.12.2 of image_processing.
### Workarounds
If you're processing based on user input, it's highly recommended that you always sanitize the user input, by allowing only a constrained set of operations. For example:
```rb
operations = params[:operations]
.map { |operation| [operation[:name], *operation[:value]] }
.select { |name, *| name.to_s.include? %w[resize_to_limit strip ...] } # sanitization
ImageProcessing::Vips.apply(operations)
```
|
{'CVE-2022-24720'}
|
2022-03-10T16:02:30.163279Z
|
2022-03-01T22:22:26Z
|
CRITICAL
| null |
{'CWE-20', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24720', 'https://github.com/janko/image_processing', 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada', 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'}
| null |
RubyGems
|
GHSA-cqxw-3p7v-p9gr
|
Phusion Passenger uses a known /tmp filename
|
In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-install-nginx-module execution, which could allow local attackers to gain the privileges of the passenger user
|
{'CVE-2016-10345'}
|
2022-04-26T20:45:11.460991Z
|
2018-08-21T17:08:03Z
|
HIGH
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10345', 'https://github.com/advisories/GHSA-cqxw-3p7v-p9gr', 'https://github.com/phusion/passenger/commit/e5b4b0824d6b648525b4bf63d9fa37e5beeae441', 'https://github.com/phusion/passenger/', 'https://github.com/phusion/passenger/blob/stable-5.1/CHANGELOG'}
| null |
RubyGems
|
GHSA-3892-2r52-p65m
|
HTTP Request Smuggling in goliath
|
goliath through 1.0.6 allows request smuggling attacks where goliath is used as a backend and a frontend proxy also being vulnerable. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TE:CL smuggling attacks.
|
{'CVE-2020-7671'}
|
2022-03-03T05:12:56.701867Z
|
2021-05-24T18:20:07Z
|
MODERATE
| null |
{'CWE-444'}
|
{'https://github.com/postrank-labs/goliath/issues/351,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7671', 'https://snyk.io/vuln/SNYK-RUBY-GOLIATH-569136'}
| null |
RubyGems
|
GHSA-jxx8-v83v-rhw3
|
Moderate severity vulnerability that affects spree
|
Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) payment_method parameter to core/app/controllers/spree/admin/payment_methods_controller.rb; and the (2) promotion_action parameter to promotion_actions_controller.rb, (3) promotion_rule parameter to promotion_rules_controller.rb, and (4) calculator_type parameter to promotions_controller.rb in promo/app/controllers/spree/admin/, related to unsafe use of the constantize function.
|
{'CVE-2013-1656'}
|
2022-03-03T05:13:44.581066Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://www.conviso.com.br/advisories/CVE-2013-1656.txt', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656', 'http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html', 'https://github.com/advisories/GHSA-jxx8-v83v-rhw3'}
| null |
RubyGems
|
GHSA-3m6r-39p3-jq25
|
Doorkeeper is vulnerable to replay attacks
|
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
|
{'CVE-2016-6582'}
|
2022-04-25T16:47:07.153658Z
|
2017-10-24T18:33:35Z
|
CRITICAL
| null |
{'CWE-1254'}
|
{'https://github.com/advisories/GHSA-3m6r-39p3-jq25', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/doorkeeper-gem/doorkeeper/issues/875', 'http://www.securityfocus.com/archive/1/539268/100/0/threaded', 'http://seclists.org/fulldisclosure/2016/Aug/105', 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html', 'https://github.com/doorkeeper-gem/doorkeeper/', 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0', 'http://www.securityfocus.com/bid/92551'}
| null |
RubyGems
|
GHSA-r74q-gxcg-73hx
|
High severity vulnerability that affects simple_form
|
## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call
### Impact
For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example:
```erb
<%= simple_form_for @user do |f| %>
<%= f.label @user_supplied_string %>
...
<% end %>
```
The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`).
By manipulation that input, an attacker could do any of the following:
- Code execution (call actions like `#destroy`)
- Denial of Service (by executing a computation intensive method)
- Information Disclosure (check the presence of methods, leak user information)
### Patches
The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem.
### Workarounds
The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected.
A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following:
```erb
<%= form.input :avatar, as: :file %>
```
### References
[TDB]
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form)
* Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br)
|
{'CVE-2019-16676'}
|
2022-03-03T05:11:44.264367Z
|
2019-09-30T19:41:15Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16676', 'https://github.com/advisories/GHSA-r74q-gxcg-73hx', 'https://github.com/plataformatec/simple_form/commits/master', 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx', 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/'}
| null |
RubyGems
|
GHSA-x24j-87x9-jvv5
|
Improper Authorization in Publify
|
In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only.
|
{'CVE-2021-25973'}
|
2022-03-07T20:47:49.397012Z
|
2021-11-03T17:34:22Z
|
MODERATE
| null |
{'CWE-285', 'CWE-863'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973', 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e', 'https://github.com/publify/publify/'}
| null |
RubyGems
|
GHSA-3v3c-r5v2-68ph
|
High severity vulnerability that affects private_address_check
|
The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.
|
{'CVE-2017-0909'}
|
2022-03-03T05:13:55.446026Z
|
2017-11-30T23:14:55Z
|
HIGH
| null |
{'CWE-184'}
|
{'https://github.com/jtdowney/private_address_check/pull/3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909', 'https://hackerone.com/reports/288950', 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}
| null |
RubyGems
|
GHSA-r7q2-5gqg-6c7q
|
Moderate severity vulnerability that affects actionpack
|
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
|
{'CVE-2011-2929'}
|
2022-03-03T05:13:11.142719Z
|
2017-10-24T18:33:38Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-r7q2-5gqg-6c7q', 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'https://github.com/rails/rails', 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}
| null |
RubyGems
|
GHSA-ghqm-pgxj-37gq
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
|
{'CVE-2015-7580'}
|
2022-03-03T05:13:29.804586Z
|
2017-10-24T18:33:36Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580', 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78', 'http://www.openwall.com/lists/oss-security/2016/01/25/15', 'https://github.com/advisories/GHSA-ghqm-pgxj-37gq', 'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'https://github.com/rails/rails-html-sanitizer/', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}
| null |
crates.io
|
GHSA-g4g4-3pqw-8m7f
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free.
|
{'CVE-2021-45718'}
|
2022-01-06T20:20:29Z
|
2022-01-06T22:02:01Z
|
HIGH
| null |
{'CWE-416'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md', 'https://github.com/rusqlite/rusqlite/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45718', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html'}
| null |
crates.io
|
GHSA-5rrv-m36h-qwf8
|
Use-after-free in chttp
|
An issue was discovered in the chttp crate before 0.1.3 for Rust. There is a use-after-free during buffer conversion.
|
{'CVE-2019-16140'}
|
2021-08-19T21:22:50Z
|
2021-08-25T20:44:40Z
|
CRITICAL
| null |
{'CWE-416'}
|
{'https://github.com/sagebind/chttp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16140', 'https://github.com/sagebind/isahc/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2019-0016.html'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.