diff --git "a/github-advisory-2017.csv" "b/github-advisory-2017.csv" new file mode 100644--- /dev/null +++ "b/github-advisory-2017.csv" @@ -0,0 +1,769 @@ +schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific +1.4.0,GHSA-jjv7-qpx3-h62q,2021-09-14T19:46:47Z,2017-10-24T18:33:36Z,,['CVE-2014-7191'],Denial-of-Service Memory Exhaustion in qs,"Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing. + + +## Recommendation + +Update to version 1.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/node-querystring/issues/104'}, {'type': 'WEB', 'url': 'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1380'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jjv7-qpx3-h62q'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/node-querystring'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/29'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60026'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21685987'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687928'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-vxvp-4xwc-jpp6,2023-01-23T18:04:55Z,2017-10-24T18:33:36Z,,['CVE-2015-3226'],activesupport Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228033946/http://www.securityfocus.com/bid/75231'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/17'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-9fh3-vh3h-q4g3,2023-05-12T17:06:32Z,2017-10-24T18:33:38Z,,['CVE-2011-2932'],activesupport Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.r`b in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a ""UTF-8 escaping vulnerability.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2932.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-xqg8-cv3h-xppv,2021-09-22T15:12:11Z,2017-10-24T18:33:36Z,,['CVE-2015-1369'],SQL Injection in sequelize,"Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter. + + + +## Proof of Concept + +```javascript +Test.findAndCountAll({ +where: { id :1 }, +order : [['id', 'UNTRUSTED USER INPUT']] +}) +``` + + +## Recommendation + +Update to version 2.0.0-rc8 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/2906'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/2919'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/33'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-gppp-5xc5-wfpx,2023-08-25T23:11:25Z,2017-10-24T18:33:37Z,,['CVE-2013-0155'],Active Record allows bypassing of database-query restrictions,"Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain ""[nil]"" values, a related issue to CVE-2012-2660 and CVE-2012-2694.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0155.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2609'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-8qrh-h9m2-5fvf,2023-06-19T21:08:41Z,2017-10-24T18:33:38Z,,['CVE-2009-3009'],Cross site scripting that affects rails,"Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3009.yml'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36717'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1022824'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2009/dsa-1887'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/57666'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/36278'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/2544'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-mgx3-27hr-mfgp,2023-03-14T20:47:11Z,2017-10-24T18:33:37Z,,['CVE-2013-1801'],HTTParty does not restrict casts of string values,"The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917229'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/httparty'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/httparty/CVE-2013-1801.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229101716/http://www.securityfocus.com/bid/58260'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-r9c2-cr39-c8g6,2023-01-24T14:56:23Z,2017-10-24T18:33:36Z,,['CVE-2015-7579'],rails-html-sanitizer Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the `Rails::Html::FullSanitizer` class.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/12'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-h77x-m5q8-c29h,2023-08-25T23:23:23Z,2017-10-24T18:33:37Z,,['CVE-2012-6109'],Rack vulnerable to REDoS,"`lib/rack/multipart.rb` in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack/'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/README.rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2013-0544.html'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:20Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}" +1.4.0,GHSA-h5g2-38x9-4gv3,2023-09-05T21:02:41Z,2017-10-24T18:33:35Z,,['CVE-2016-10173'],archive-tar-minitar and minitar vulnerable to Path Traversal,Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a `..` (dot dot) in a TAR archive entry.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/halostatue/minitar'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201702-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214020917/http://www.securityfocus.com/bid/95874'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207111726/https://www.puppet.com/security/cve/cve-2016-10173'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3778'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/24/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/29/1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-3fx5-fwvr-xrjg,2021-09-22T20:19:52Z,2017-10-24T18:33:36Z,,['CVE-2015-8315'],Regular Expression Denial of Service in ms,"Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. + +## Proof of Concept +```javascript +var ms = require('ms'); +var genstr = function (len, chr) { + var result = """"; + for (i=0; i<=len; i++) { + result = result + chr; + } + + return result; +} + +ms(genstr(process.argv[2], ""5"") + "" minutea""); + +``` + +### Results +Showing increase in execution time based on the input string. +``` +$ time node ms.js 10000 + +real 0m0.758s +user 0m0.724s +sys 0m0.031s + +$ time node ms.js 20000 + +real 0m2.580s +user 0m2.494s +sys 0m0.047s + +$ time node ms.js 30000 + +real 0m5.747s +user 0m5.483s +sys 0m0.080s + +$ time node ms.js 80000 + +real 0m41.022s +user 0m38.894s +sys 0m0.529s +``` +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/millisecond/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96389'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-gfjr-3jmm-4g9v,2021-09-10T20:53:22Z,2017-10-24T18:33:36Z,,['CVE-2015-8860'],Symlink Arbitrary File Overwrite in tar,"Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory. + + + +## Recommendation + +Update to version 2.0.0 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/releases/tag/v2.7.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/57'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-6mq2-37j5-w6r6,2023-08-01T21:37:33Z,2017-10-24T18:33:38Z,,['CVE-2009-4492'],WEBrick Improper Input Validation vulnerability,"WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/webrick'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0908.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0909.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection'}, {'type': 'WEB', 'url': 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-vxf6-w9mp-95hm,2023-05-12T17:24:42Z,2017-10-24T18:33:38Z,,['CVE-2012-3408'],Puppet supports use of IP addresses in certnames without warning of potential risks,"`lib/puppet/network/authstore.rb` in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839166'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3408.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3408-agent-impersonation'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3408/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:51Z', 'nvd_published_at': '2012-08-06T16:55:00Z'}" +1.4.0,GHSA-59c7-4xj2-hgvw,2023-01-23T20:38:10Z,2017-10-24T18:33:36Z,,['CVE-2015-7578'],rails-html-sanitizer Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/11'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-v3rr-cph9-2g2q,2023-01-23T18:02:54Z,2017-10-24T18:33:36Z,,['CVE-2014-2538'],rack-ssl Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in `lib/rack/ssl.rb` in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-ssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538'}, {'type': 'WEB', 'url': 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'}, {'type': 'PACKAGE', 'url': 'https://github.com/josh/rack-ssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack-ssl/CVE-2014-2538.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140524002455/http://secunia.com/advisories/57466'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228185649/http://www.securityfocus.com/bid/66314'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/19/20'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-8fqx-7pv4-3jwm,2023-05-26T16:54:58Z,2017-10-24T18:33:38Z,,['CVE-2008-7248'],Improper Input Validation in actionpack,"Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=544329'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2008-7248.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'https://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/https://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/12/02/2'}, {'type': 'WEB', 'url': 'https://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/02/2'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:28Z', 'nvd_published_at': '2009-12-16T01:30:00Z'}" +1.4.0,GHSA-fcqf-h4h4-695m,2023-07-19T18:42:54Z,2017-10-24T18:33:38Z,,['CVE-2011-3186'],actionpack CRLF injection vulnerability,CRLF injection vulnerability in `actionpack/lib/action_controller/response.rb` in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3186.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150201000000*/http://secunia.com/advisories/45921'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-cfjh-p3g4-3q2f,2021-09-09T17:02:02Z,2017-10-24T18:33:36Z,,['CVE-2015-1370'],VBScript Content Injection in marked,"Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. + +## Proof of Concept ( IE10 Compatibility Mode Only ) + +`[xss link](vbscript:alert(1))` + +will get a link + +`xss link` + + +## Recommendation + +Update to version 0.3.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24/versions'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-jxx8-v83v-rhw3,2023-08-29T09:24:34Z,2017-10-24T18:33:37Z,,['CVE-2013-1656'],Spree Improper Input Validation vulnerability,"Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) `payment_method` parameter to `core/app/controllers/spree/admin/payment_methods_controller.rb`; and the (2) `promotion_action parameter` to `promotion_actions_controller.rb`, (3) `promotion_rule parameter` to `promotion_rules_controller.rb`, and (4) `calculator_type` parameter to `promotions_controller.rb` in `promo/app/controllers/spree/admin/`, related to unsafe use of the constantize function.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0.rc1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/70092eb55b8be8fe5d21a7658b62da658612fba7'}, {'type': 'WEB', 'url': 'https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2013-1656.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130907044454/https://www.conviso.com.br/advisories/CVE-2013-1656.txt'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140329142330/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140618100330/http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-w6rc-q387-vpgq,2023-06-09T20:17:24Z,2017-10-24T18:33:37Z,,['CVE-2013-4136'],insecure temporary directory usage in passenger,ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}, {'type': 'WEB', 'url': 'https://code.google.com/p/phusion-passenger/issues/detail?id=910'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6rc-q387-vpgq'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-4136.yml'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/16/6'}]","{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-j24p-r6wx-r79w,2021-09-14T18:09:44Z,2017-10-24T18:33:38Z,,['CVE-2009-3287'],High severity vulnerability that affects thin,"lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'thin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3287'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j24p-r6wx-r79w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thin/CVE-2009-3287.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/macournoyer/thin'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/blob/master/CHANGELOG'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-xrr4-p6fq-hjg7,2023-07-05T20:50:18Z,2017-10-24T18:33:35Z,,['CVE-2016-0752'],Directory traversal vulnerability in Action View in Ruby on Rails,"Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` (dot dot) in a pathname.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-p6fq-hjg7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210618005620/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210621170450/http://www.securityfocus.com/bid/81801'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210723192420/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40561/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/13'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-mpxf-gcw2-pw5q,2023-07-31T18:14:44Z,2017-10-24T18:33:37Z,,['CVE-2013-6414'],actionpack Improper Input Validation vulnerability,`actionpack/lib/action_view/lookup_context.rb` in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6414.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160421165124/http://secunia.com/advisories/57836'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808161629/https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-w37c-q653-qg95,2023-07-26T18:41:29Z,2017-10-24T18:33:36Z,,['CVE-2013-6416'],actionpack Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in the simple_format helper in `actionpack/lib/action_view/helpers/text_helper.rb` in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4b4f5847f64f81c961625e647711ef9f6ad1a454'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6416.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/5ZI1-H5OoIM/ZNq4FoR2GnIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228165109/http://www.securityfocus.com/bid/64071'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:19Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}" +1.4.0,GHSA-v2r9-c84j-v7xm,2023-07-05T20:39:56Z,2017-10-24T18:33:37Z,,['CVE-2013-0256'],RDoc contains XSS vulnerability,"darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.12.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256'}, {'type': 'WEB', 'url': 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=907820'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm'}, {'type': 'PACKAGE', 'url': 'https://github.com/rdoc/rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0728.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:28Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}" +1.4.0,GHSA-87vv-r9j6-g5qv,2022-06-07T14:31:25Z,2017-10-24T18:33:35Z,,['CVE-2016-4055'],Regular Expression Denial of Service in moment,"Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`. + + +## Proof of concept +``` +var moment = require('moment'); + +var genstr = function (len, chr) { + var result = """"; + for (i=0; i<=len; i++) { + result = result + chr; + } + + return result; +} + + +for (i=20000;i<=10000000;i=i+10000) { + console.log(""COUNT: "" + i); + var str = '-' + genstr(i, '1') + console.log(""LENGTH: "" + str.length); + var start = process.hrtime(); + moment.duration(str) + + var end = process.hrtime(start); + console.log(end); +} +``` + +### Results +``` +$ node moment.js +COUNT: 20000 +LENGTH: 20002 +[ 0, 618931029 ] +COUNT: 30001 +LENGTH: 30003 +[ 1, 401413894 ] +COUNT: 40002 +LENGTH: 40004 +[ 2, 437075303 ] +COUNT: 50003 +LENGTH: 50005 +[ 3, 824664804 ] +COUNT: 60004 +LENGTH: 60006 +[ 5, 651335262 ] +``` + + +## Recommendation + +Please update to version 2.11.2 or later. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/55'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-02'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95849'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:44Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}" +1.4.0,GHSA-78j3-7wpm-qhvp,2023-07-05T19:12:35Z,2017-10-24T18:33:37Z,,['CVE-2013-1947'],Shell Metacharacter Injection in kelredd-pruview,"kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to document.rb, video.rb, or video_image.rb.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'kelredd-pruview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-78j3-7wpm-qhvp'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kelredd-pruview/CVE-2013-1947.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/kelredd-pruview-cmd-inject.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/12/2'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-5vx5-9q73-wgp4,2023-09-05T21:30:18Z,2017-10-24T18:33:35Z,,['CVE-2017-7540'],Safemode Gem Has Incomplete List of Disallowed Inputs,"rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/pull/23'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}]","{'cwe_ids': ['CWE-184'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:24Z', 'nvd_published_at': '2017-07-21T22:29:00Z'}" +1.4.0,GHSA-gr44-7grc-37vq,2023-01-23T17:23:13Z,2017-10-24T18:33:37Z,,['CVE-2013-0276'],ActiveRecord vulnerable to modification of protected model attributes,"ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0276.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130217055442/http://www.securityfocus.com/bid/57896'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/5'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-9qj7-jvg4-qr2x,2023-07-05T18:50:18Z,2017-10-24T18:33:37Z,,['CVE-2013-2119'],Phusion Passenger Denial of Service,"Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary ""config"" file in a directory with a predictable name in `/tmp/` before it is used by the gem.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=892813'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-2119.yml'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}]","{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:24Z', 'nvd_published_at': '2014-01-03T18:54:00Z'}" +1.4.0,GHSA-p65m-qr5x-rrqq,2023-01-26T21:22:44Z,2017-10-24T18:33:36Z,,['CVE-2013-7086'],Webbynode Code Injection vulnerability,The message function in `lib/webbynode/notify.rb` in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'webbynode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086'}, {'type': 'WEB', 'url': 'https://github.com/webbynode/webbynode/pull/85'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webbynode/CVE-2013-7086.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbynode/webbynode'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229074410/http://www.securityfocus.com/bid/64289'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208124343/http://www.vapid.dhs.org/advisories/webbynode-command-inj.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/124421'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/493'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/497'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-jmgf-p46x-982h,2023-05-11T13:47:53Z,2017-10-24T18:33:38Z,,['CVE-2008-5189'],rails is vulnerable to CRLF injection,CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmgf-p46x-982h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2008-5189.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/32359'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-3pxh-h8hw-mj8w,2023-08-28T12:50:30Z,2017-10-24T18:33:37Z,,['CVE-2013-0183'],Rack rubygems receiving excessively long lines triggers out-of-memory error,multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895282'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0183.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rack.github.com/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0548.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2783'}]","{'cwe_ids': ['CWE-119', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:49Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}" +1.4.0,GHSA-jmgw-6vjg-jjwg,2023-02-15T22:22:59Z,2017-10-24T18:33:37Z,,['CVE-2013-0156'],actionpack Improper Input Validation vulnerability,"`active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140111025708/http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160415043747/https://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806154149/https://puppet.com/security/cve/cve-2013-0156/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0153.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0155.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2604'}, {'type': 'WEB', 'url': 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html'}, {'type': 'WEB', 'url': 'http://www.insinuator.net/2013/01/rails-yaml/'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/380039'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:48Z', 'nvd_published_at': '2013-01-13T22:55:00Z'}" +1.4.0,GHSA-fh39-v733-mxfr,2023-03-14T22:18:13Z,2017-10-24T18:33:38Z,,['CVE-2012-2661'],Active Record vulnerable to SQL Injection via nested query parameters,"The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-cj92-c4fj-w9c5,2023-09-05T21:10:15Z,2017-10-24T18:33:38Z,,['CVE-2012-2139'],Mail Gem Path Traversal vulnerability,Directory traversal vulnerability in `lib/mail/network/delivery_methods/file_delivery.rb` in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a `..` (dot dot) in the to parameter.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-q4qq-fm7q-cwp5,2021-09-16T19:30:36Z,2017-10-24T18:33:36Z,,['CVE-2013-7454'],Multiple XSS Filter Bypasses in validator,"Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter. + + +## Proof of Concept +Various inputs that could bypass the filter were discovered: + +Improper parsing of nested tags: + +``` + <;s onmouseover=""alert(1)"">This is a test +``` + +Incomplete filtering of javascript: URIs: + +``` +"">test +``` + +UI Redressing: + +``` +
+

You have won

Please click the link and enter your login details: +http://good.com +
+``` + +Bypass via Nested Forbidden Strings: + +``` +prompt(1); +``` + +Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of. + + +## Recommendation + +If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/41'}, {'type': 'WEB', 'url': 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-76wq-xw4h-f8wj,2023-05-12T17:04:06Z,2017-10-24T18:33:38Z,,['CVE-2012-2695'],activerecord vulnerable to SQL Injection,"The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2695.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/l4L0TEVAz1k/m/Vr84sD9B464J'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-jg4m-q6w8-vrjp,2023-01-26T21:04:14Z,2017-10-24T18:33:37Z,,['CVE-2013-4203'],rgpg Code Injection vulnerability,The `self.run_gpg` function in `lib/rgpg/gpg_helper.rb` in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rgpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}, {'type': 'WEB', 'url': 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcook/rgpg'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rgpg/CVE-2013-4203.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/08/03/2'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-574q-fxfj-wv6h,2023-05-12T17:26:05Z,2017-10-24T18:33:37Z,,['CVE-2013-1655'],Puppet Improper Input Validation vulnerability,"Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to ""serialized attributes.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-1655/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228144801/http://www.securityfocus.com/bid/58442'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-1655-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1759-1'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2643'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-5726-g6r9-5f22,2022-02-25T19:54:10Z,2017-10-24T18:33:36Z,,['CVE-2014-7192'],Potential for Script Injection in syntax-error,"Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified. + +## Recommendation + +Update to version 1.1.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'syntax-error'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5726-g6r9-5f22'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-browserify/blob/master/changelog.markdown#421'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/node-syntax-error'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/37'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21690815'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-w754-gq8r-pf5f,2023-08-29T14:01:28Z,2017-10-24T18:33:37Z,,['CVE-2013-2616'],MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection,`lib/mini_magick.rb` in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2013-2616.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130315095512/http://www.securityfocus.com/bid/58448'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/123'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-ww79-8xwv-932x,2023-08-28T16:11:35Z,2017-10-24T18:33:36Z,,['CVE-2014-0036'],rbovirt uses the rest-client gem with SSL verification disabled,"The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rbovirt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595'}, {'type': 'PACKAGE', 'url': 'https://github.com/abenari/rbovirt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rbovirt/CVE-2014-0036.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/509'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-8r6h-7x9g-xmw9,2023-01-23T20:49:57Z,2017-10-24T18:33:36Z,,['CVE-2013-6459'],will_paginate Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'will_paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/mislav/will_paginate'}, {'type': 'WEB', 'url': 'https://github.com/mislav/will_paginate/releases/tag/v3.0.5'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150709163604/http://www.securityfocus.com/bid/64509'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-rxq3-gm4p-5fj4,2023-05-11T13:58:44Z,2017-10-24T18:33:38Z,,['CVE-2009-2422'],rails vulnerable to improper authentication,"The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-2422.yml'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/35702'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/35579'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/1802'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-qrgf-jqqm-x7xv,2023-01-24T14:54:19Z,2017-10-24T18:33:37Z,,['CVE-2013-5671'],Code injection in dragonfly gem,`lib/dragonfly/imagemagickutils.rb` in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fog-dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/520'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/486'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208033320/http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Sep/18'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/526'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/528'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-jxhw-mg8m-2pj8,2023-01-23T21:20:12Z,2017-10-24T18:33:37Z,,['CVE-2013-0233'],Devise does not properly perform type conversion when performing database queries,"Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233'}, {'type': 'WEB', 'url': 'https://github.com/Snorby/snorby/issues/261'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140726005251/http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103406/http://www.securityfocus.com/bid/57577'}, {'type': 'WEB', 'url': 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html'}, {'type': 'WEB', 'url': 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/01/29/3'}]","{'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-xf96-32q2-9rw2,2023-05-26T16:40:08Z,2017-10-24T18:33:38Z,,['CVE-2008-4094'],Rails ActiveRecord gem vulnerable to SQL injection,"Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) `:limit` and (2) `:offset` parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ef0ea782b1f5cf7b08e74ea3002a16c708f66645'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2008-4094.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620000955/http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201733/http://blog.innerewut.de/files/rails/activerecord-1.15.3.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201744/http://blog.innerewut.de/files/rails/activerecord-2.0.2.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081104151751/http://gist.github.com/8946'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081113122736/http://secunia.com/advisories/31875/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211431/http://secunia.com/advisories/31909'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211436/http://secunia.com/advisories/31910'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20091101000000*/http://www.vupen.com/english/advisories/2008/2562'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120120194518/http://www.securityfocus.com/bid/31176'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207112829/http://www.securitytracker.com/id?1020871'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/288'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/964'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/16/1'}, {'type': 'WEB', 'url': 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-fqrr-rrwg-69pv,2023-07-05T18:46:48Z,2017-10-24T18:33:36Z,,['CVE-2014-1233'],Local API Login Credentials Disclosure in paratrooper-pingdom,"The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process. + +### Vulnerable Code: + +From: `paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb` + +```ruby +def setup(options = {}) + %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d ""paused=true"" -H ""App-Key: #{app_key}"" -u ""#{username}:#{password}""] +end + +def teardown(options = {}) + %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d ""paused=false"" -H ""App-Key: #{app_key}"" -u ""#{username}:#{password}""] +end +``` + +A malicious user could monitor the process tree to steal the API key, username and password for the API login. +",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-pingdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-pingdom/CVE-2014-1233.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/1'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:08Z', 'nvd_published_at': '2014-01-10T12:02:00Z'}" +1.4.0,GHSA-543v-gj2c-r3ch,2023-06-30T21:32:03Z,2017-10-24T18:33:35Z,,['CVE-2016-0753'],activemodel contains Improper Input Validation,"Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/14'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-552w-rqg8-gxxm,2021-09-01T19:26:29Z,2017-10-24T18:33:36Z,,['CVE-2013-7453'],Moderate severity vulnerability that affects validator,The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-552w-rqg8-gxxm'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-c5qq-g673-5p49,2023-05-12T17:08:19Z,2017-10-24T18:33:38Z,,['CVE-2012-1989'],Puppet allows local users to overwrite arbitrary files via a symlink attack,"`telnet.rb` in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (`/tmp/out.log`).",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.1'}, {'fixed': '2.7.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1989.yml'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/15087408'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-1989-arbitrary-file-write-access'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/issues/13606'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-1989/'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1419-1'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-hqf9-rc9j-5fmj,2023-07-05T17:50:02Z,2017-10-24T18:33:36Z,,['CVE-2014-0080'],Array data injection vulnerability in activerecord,"SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute ""add data"" SQL commands via vectors involving `\` (backslash) characters that are not properly handled in operations on array columns.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0.beta1'}, {'fixed': '4.1.0.beta2'}]}], 'versions': ['4.1.0.beta1']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-0080.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210301004521/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/Wu96YkTUR6s/pPLBMZrlwvYJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/9'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-73qw-ww62-m54x,2023-01-25T23:05:06Z,2017-10-24T18:33:36Z,,['CVE-2015-7541'],colorscore Command Injection vulnerability,"The initialize method in the Histogram class in `lib/colorscore/histogram.rb` in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) `image_path`, (2) `colors`, or (3) `depth` variable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'WEB', 'url': 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}, {'type': 'PACKAGE', 'url': 'https://github.com/quadule/colorscore'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/colorscore/CVE-2015-7541.yml'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2015-7541/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q1/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-f7f4-5w9j-23p2,2023-01-25T23:16:58Z,2017-10-24T18:33:35Z,,['CVE-2016-10194'],festivaltts4r allows arbitrary command execution,The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'WEB', 'url': 'https://github.com/spejman/festivaltts4r/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/spejman/festivaltts4r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-vx9j-46rh-fqr8,2023-07-05T20:44:17Z,2017-10-24T18:33:35Z,,['CVE-2016-2097'],actionview contains Path Traversal vulnerability,"There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097. + +Versions Affected: 3.2.x, 4.0.x, 4.1.x +Not affected: 4.2+ +Fixed Versions: 3.2.22.2, 4.1.14.2 + +Impact +------ +Applications that pass unverified user input to the `render` method in a controller may be vulnerable to an information leak vulnerability. + +Impacted code will look something like this: + +```ruby +def index + render params[:id] +end +``` + +Carefully crafted requests can cause the above code to render files from unexpected places like outside the application's view directory, and can possibly escalate this to a remote code execution attack. + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The FIXED releases are available at the normal locations. + +Workarounds +----------- +A workaround to this issue is to not pass arbitrary user input to the `render` method. Instead, verify that data before passing it to the `render` method. + +For example, change this: + +```ruby +def index + render params[:id] +end +``` + +To this: + +```ruby +def index + render verify_template(params[:id]) +end + +private +def verify_template(name) + # add verification logic particular to your application here +end +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for it. It is in git-am format and consist of a single changeset. + +* 3-2-render_data_leak_2.patch - Patch for 3.2 series +* 4-1-render_data_leak_2.patch - Patch for 4.1 series + +Credits +------- +Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this and working with us in the patch!","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a1d3ea617ffb0c8ae8467fa439bf63a3bfc4324'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ddY6HgqB2z4'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160322002234/http://www.securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015320/http://www.securityfocus.com/bid/83726'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201221115217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-c9c5-9fpr-m882,2023-01-25T23:16:15Z,2017-10-24T18:33:36Z,,['CVE-2014-9490'],sentry-raven allows remote attackers to cause a denial of service via a large exponent value in a scientific number,The `numtok` function in `lib/raven/okjson.rb` in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sentry-raven'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/raven-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sentry-raven/CVE-2014-9490.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/getsentry/Cz5bih0ZY1U'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2015/q1/26'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-v633-x5vv-hqwc,2021-09-20T15:12:25Z,2017-10-24T18:33:36Z,,['CVE-2015-8856'],Cross-Site Scripting in serve-index,"Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application. + + +## Recommendation + +Update to version 1.6.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve-index'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/commit/7381a1d1458959e57ee53ac932b06ff17904777e'}, {'type': 'PACKAGE', 'url': 'https://github.com/expressjs/serve-index'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96392'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-4jm3-pfpf-h54p,2023-01-25T22:57:24Z,2017-10-24T18:33:35Z,,['CVE-2016-10193'],espeak-ruby allows arbitrary command execution,"The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the `speak`, `save`, `bytes` or `bytes_wav` method in `lib/espeak/speech.rb`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/commit/5251744b13bdd9fb0c72c612226e72d330bac143'}, {'type': 'PACKAGE', 'url': 'https://github.com/dejan/espeak-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/espeak-ruby/CVE-2016-10193.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-6x46-7rrv-m4h8,2023-05-12T16:04:23Z,2017-10-24T18:33:38Z,,['CVE-2011-0995'],"sqlite3-ruby uses weak permissions for unspecified files, which allows local users to gain privileges","The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sqlite3-ruby/CVE-2011-0995.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schuyler/sqlite3-ruby'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20110513184951/http://support.novell.com/security/cve/CVE-2011-0995.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229151908/http://www.securityfocus.com/bid/47694'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201106213407/https://bugzilla.novell.com/show_bug.cgi?id=685928'}, {'type': 'WEB', 'url': 'https://www.suse.com/security/cve/CVE-2011-0995.html'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-9h6g-gp95-x3q5,2022-04-25T20:52:00Z,2017-10-24T18:33:36Z,,['CVE-2015-7581'],actionpack is vulnerable to denial of service because of a wildcard controller route,actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7581.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81677'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200516093752/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/16'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-mx9f-w8qq-q5jf,2023-01-23T21:26:28Z,2017-10-24T18:33:36Z,,['CVE-2015-3448'],rest-client allows local users to obtain sensitive information by reading the log,"REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/349'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228154247/http://www.securityfocus.com/bid/74415'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-fjfg-q662-gm6j,2023-05-11T13:40:44Z,2017-10-24T18:33:38Z,,['CVE-2007-5379'],Moderate severity vulnerability that affects rails,"Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjfg-q662-gm6j'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5379.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8453'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://osvdb.org/40717'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-8jxj-9r5f-w3m2,2023-05-12T17:05:34Z,2017-10-24T18:33:37Z,,['CVE-2012-3866'],Puppet allows local users to obtain sensitive configuration information,"`lib/puppet/defaults.rb` in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for `last_run_report.yaml`, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3866.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3866-lastrunreportyaml-world-readable'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3866/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-7cgp-c3g7-qvrw,2023-06-30T21:25:19Z,2017-10-24T18:33:36Z,,['CVE-2014-0082'],actionpack Improper Input Validation vulnerability,"`actionpack/lib/action_view/template/text.rb` in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the `:text` option to the `render` method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0082.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207044540/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220315115444/https://puppet.com/security/cve/cve-2014-0082'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-c92m-rrrc-q5wf,2023-09-05T21:11:43Z,2017-10-24T18:33:35Z,,['CVE-2016-3693'],safemode gem allows context-dependent attackers to obtain sensitive information via the inspect method,"The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}, {'type': 'WEB', 'url': 'http://projects.theforeman.org/issues/14635'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2016-3693/'}, {'type': 'WEB', 'url': 'http://theforeman.org/security.html#2016-3693'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/8'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:40Z', 'nvd_published_at': '2016-05-20T14:59:00Z'}" +1.4.0,GHSA-rfmf-rx8w-935w,2023-07-03T21:20:17Z,2017-10-24T18:33:37Z,,['CVE-2013-5647'],Sounder Contains Arbitrary Command Execution Vulnerability,lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sounder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamzaninovich/sounder'}, {'type': 'WEB', 'url': 'https://github.com/adamzaninovich/sounder/blob/v1.0.1/lib/sounder/sound.rb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rfmf-rx8w-935w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sounder/CVE-2013-5647.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-3vfw-7rcp-3xgm,2023-05-12T15:20:04Z,2017-10-24T18:33:38Z,,['CVE-2011-3187'],actionpack Improper Input Validation vulnerability,"The `to_s` method in `actionpack/lib/action_dispatch/middleware/remote_ip.rb` in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3187.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111209181000/http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html'}, {'type': 'WEB', 'url': 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-6jvm-3j5h-79f6,2023-01-23T20:43:16Z,2017-10-24T18:33:36Z,,['CVE-2015-2963'],paperclip Cross-site Scripting vulnerability,"The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}, {'type': 'WEB', 'url': 'https://robots.thoughtbot.com/paperclip-security-release'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084907/http://www.securityfocus.com/bid/75304'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN83881261/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/19/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-qpjp-7rp2-9c3f,2021-09-16T20:03:05Z,2017-10-24T18:33:36Z,,['CVE-2013-7451'],Moderate severity vulnerability that affects validator,The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-rvpq-5xqx-pfpp,2023-05-11T13:57:05Z,2017-10-24T18:33:38Z,,['CVE-2006-4111'],Ruby on Rails vulnerable to code injection,"Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with ""severe"" or ""serious"" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp'}, {'type': 'WEB', 'url': 'https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4111.yml'}, {'type': 'WEB', 'url': 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/3237'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-q6cw-2553-7837,2023-08-29T13:38:38Z,2017-10-24T18:33:37Z,,['CVE-2013-0284'],newrelic_rpm Gem Discloses Sensitive Information,"Ruby agent 3.2.0 through 3.5.3.23 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'newrelic_rpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.5.3.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.3.23'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'}, {'type': 'PACKAGE', 'url': 'https://github.com/newrelic/newrelic-ruby-agent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/newrelic_rpm/CVE-2013-0284.yml'}, {'type': 'WEB', 'url': 'https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130117025417/https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-2fqv-h3r5-m4vf,2021-08-30T21:12:50Z,2017-10-24T18:33:35Z,,['CVE-2017-1000006'],Cross Site Scripting (XSS) in plotly.js,"Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package. + + +## Recommendation + +Update to 1.16.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'plotly.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}, {'type': 'WEB', 'url': 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/145'}, {'type': 'WEB', 'url': 'http://help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-qqxp-xp9v-vvx6,2023-09-27T21:55:57Z,2017-10-24T18:33:37Z,,['CVE-2012-6662'],jquery-ui Tooltip widget vulnerable to XSS,"Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2012-6662.yml'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8859'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8861'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-9p3v-wf2w-v29c,2021-09-08T20:12:31Z,2017-10-24T18:33:38Z,,['CVE-2009-4214'],Moderate severity vulnerability that affects rails,"Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p3v-wf2w-v29c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-4214.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37446'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38915'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/27/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/08/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/37142'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1023245'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/3352'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-78rc-8c29-p45g,2023-07-03T18:58:43Z,2017-10-24T18:33:35Z,,['CVE-2016-2098'],actionpack allows remote code execution via application's unrestricted use of render method,"Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2098.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015318/http://www.securityfocus.com/bid/83725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210612214217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211205173437/https://securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40086/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-h6w6-xmqv-7q78,2023-05-12T17:14:49Z,2017-10-24T18:33:38Z,,['CVE-2011-2930'],activerecord vulnerable to SQL Injection,"Multiple SQL injection vulnerabilities in the `quote_table_name` method in the ActiveRecord adapters in `activerecord/lib/active_record/connection_adapters/` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731438'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-2930.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-jmm9-2p29-vh2w,2023-05-12T17:17:16Z,2017-10-24T18:33:38Z,,['CVE-2011-0448'],activerecord vulnerable to SQL Injection,"Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/354da43ab0a10b3b7b3f9cb0619aa562c3be8474'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-0448.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201220214809/http://securitytracker.com/id?1025063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-gjxw-5w2q-7grf,2023-05-26T16:50:51Z,2017-10-24T18:33:38Z,,['CVE-2010-3933'],Rails activerecord gem has Improper Input Validation vulnerability,"Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.9'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d96bccb1e8b62e3e11ca0c5d38aaa8cece889ae'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/96183e0f284bab27667e5a38fa6a1578eb029585'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2010-3933.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20101129225633/http://securitytracker.com/alerts/2010/Oct/1024624.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/41930'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1024624'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-7g65-ghrg-hpf5,2023-01-23T16:30:29Z,2017-10-24T18:33:37Z,,['CVE-2012-3465'],actionpack Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e91e4e8bbee12ce1496bf384c04da6be296b687a'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-r5hc-9xx5-97rw,2023-07-04T00:12:42Z,2017-10-24T18:33:37Z,,['CVE-2013-4492'],i18n gem Cross-site Scripting vulnerability ,Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0380'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1039435'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/i18n/CVE-2013-4492.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/i18n'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208125214/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210731082547/http://www.securityfocus.com/bid/64076'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2830'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:45Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}" +1.4.0,GHSA-xwr3-fmgj-mmfr,2023-08-25T20:12:12Z,2017-10-24T18:33:36Z,,['CVE-2013-7111'],Exposure of Sensitive Information in bio-basespace-sdk,"The put_call function in the API client (`api/api_client.rb`) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the `API_KEY` on the command line, which allows remote attackers to obtain sensitive information by listing the processes.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'bio-basespace-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bio-basespace-sdk/CVE-2013-7111.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/14/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/15/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-xgj6-pgrm-x4r2,2023-01-26T22:31:40Z,2017-10-24T18:33:38Z,,['CVE-2007-6183'],gtk2 vulnerable to Use of Externally-Controlled Format String,"Format string vulnerability in the `mdiag_initialize` function in `gtk/src/rbgtkmessagedialog.c` in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'gtk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=402871'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228174159/http://www.securityfocus.com/bid/26616'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207224244/https://www.securityfocus.com/archive/1/484240/100/0/threaded'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=200623'}, {'type': 'WEB', 'url': 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200712-09.xml'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/3407'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2007/dsa-1431'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2008:033/?name=MDVSA-2008:033'}]","{'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-4c4w-3q45-hp9j,2023-01-25T22:56:46Z,2017-10-24T18:33:36Z,,['CVE-2013-7463'],Aescrypt does not sufficiently use random values,"The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'aescrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7463'}, {'type': 'WEB', 'url': 'https://github.com/Gurpartap/aescrypt/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gurpartap/aescrypt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/aescrypt/CVE-2013-7463.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227173428/http://www.securityfocus.com/bid/98035'}]","{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-pchc-949f-53m5,2023-02-13T17:01:58Z,2017-10-24T18:33:37Z,,['CVE-2013-0175'],Improper Input Validation in multi_xml,"multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'multi_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'}, {'type': 'WEB', 'url': 'https://github.com/sferik/multi_xml/pull/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/sferik/multi_xml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=5040457'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2013/01/11/9'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:50Z', 'nvd_published_at': '2013-04-25T23:55:00Z'}" +1.4.0,GHSA-j96r-xvjq-r9pg,2023-01-23T17:49:35Z,2017-10-24T18:33:36Z,,['CVE-2015-3227'],activesupport vulnerable to Denial of Service via large XML document depth,"The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228041703/http://www.securityfocus.com/bid/75234'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/16'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-92w9-2pqw-rhjj,2023-01-23T16:31:49Z,2017-10-24T18:33:38Z,,['CVE-2012-3424'],actionpack Improper Authentication vulnerability,"The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a `with_http_digest` helper method, as demonstrated by the `authenticate_or_request_with_http_digest` method.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-fhj9-cjjh-27vm,2023-03-14T22:15:51Z,2017-10-24T18:33:37Z,,['CVE-2013-0277'],Active Record contains deserialization of arbitrary YAML,ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0277.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0277'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1028109'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/6'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-g266-3crh-h7gj,2023-08-29T16:28:48Z,2017-10-24T18:33:37Z,,['CVE-2013-1911'],ldoce Gem Arbitrary Command Execution,`lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'ldoce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911'}, {'type': 'WEB', 'url': 'https://github.com/markburns/ldoce/issues/1'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163'}, {'type': 'PACKAGE', 'url': 'https://github.com/markburns/ldoce'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ldoce/CVE-2013-1911.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229102422/http://www.securityfocus.com/bid/58783'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.html'}, {'type': 'WEB', 'url': 'http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/31/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58783'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-m46p-ggm5-5j83,2023-07-05T20:33:59Z,2017-10-24T18:33:36Z,,['CVE-2014-0081'],Rails vulnerable to Cross-site Scripting,"There is an XSS vulnerability in the `number_to_currency`, `number_to_percentage` and `number_to_human` helpers in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2014-0081. + +Versions Affected: All. +Fixed Versions: 4.1.0.beta2, 4.0.3, 3.2.17. + +Impact +------ +These helpers allows users to nicely format a numeric value. Some of the parameters to the helper (format, negative_format and units) are not escaped correctly. Applications which pass user controlled data as one of these parameters are vulnerable to an XSS attack. + +All users passing user controlled data to these parameters of the number helpers should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The 4.1.0.rc1, 4.0.3 and 3.2.17 releases are available at the normal locations. + +Workarounds +----------- + +The workaround for this issue is to escape the value passed to the parameter. +For example, replace code like this: + +```ruby +<%= number_to_currency(1.02, format: params[:format]) %> +``` + +With code like this + +```ruby +<%= number_to_currency(1.02, format: h(params[:format])) %> +``` + +Patches +------- +To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + +* 4-1-beta-number_helpers_xss.patch - Patch for 4.1-beta series +* 4-0-number_helpers_xss.patch - Patch for 4.0 series +* 3-2-number_helpers_xss.patch - Patch for 3.2 series + +Please note that only the 4.0.x and 3.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- + +Thanks to Kevin Reintjes for reporting the issue to us. + +-- +Aaron Patterson +http://tenderlovemaking.com/ +",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140911141416/http://www.securitytracker.com/id/1029782'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170307202606/http://www.securityfocus.com/bid/65647'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207045136/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/8'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-84fq-6626-w5fg,2020-08-31T18:07:28Z,2017-10-24T18:33:36Z,,['CVE-2014-7193'],CORS Token Disclosure in crumb,"When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user. + +A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all. + + +## Recommendation + +Update to version 3.0.0 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'crumb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'WEB', 'url': 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-84fq-6626-w5fg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/4'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:14Z', 'nvd_published_at': '2014-12-25T11:59:00Z'}" +1.4.0,GHSA-6c8p-qphv-668v,2023-06-09T20:18:48Z,2017-10-24T18:33:37Z,,['CVE-2013-1812'],Denial of service in ruby-openid,The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/pull/43'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=918134'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6c8p-qphv-668v'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/ruby-openid'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-openid/CVE-2013-1812.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/03/8'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-v9v4-7jp6-8c73,2023-04-20T21:47:18Z,2017-10-24T18:33:38Z,,['CVE-2011-2197'],rails Cross-site Scripting vulnerability,"The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/53a2c0baf2b128dd4808eca313256f6f4bb8c4cd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ed3796434af6069ced6a641293cf88eef3b284da'}, {'type': 'WEB', 'url': 'https://gist.github.com/NZKoz/b2ceb626fc2bcdfe497f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2197.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/09/2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/13/9'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-fmr4-7g9q-7hc7,2020-06-17T16:30:43Z,2017-10-24T18:33:36Z,2020-06-17T16:30:43Z,[],Moderate severity vulnerability that affects handlebars,**Withdrawn:** Duplicate of GHSA-9prh-257w-9277,[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-vm28-mrm7-fpjq,2023-08-28T16:26:10Z,2017-10-24T18:33:36Z,,['CVE-2014-2888'],sfpagent Command Injection vulnerability,`lib/sfpagent/bsig.rb` in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sfpagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/herry13/sfpagent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sfpagent/CVE-2014-2888.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201029141944/http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Apr/243'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/18/4'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:58Z', 'nvd_published_at': '2014-04-23T15:55:00Z'}" +1.4.0,GHSA-xrr6-3pc4-m447,2023-08-25T23:37:47Z,2017-10-24T18:33:36Z,,['CVE-2015-7577'],Active Record Improper Access Control,"`activerecord/lib/active_record/nested_attributes.rb` in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.beta1'}, {'fixed': '5.0.0.beta1.1'}]}], 'versions': ['5.0.0.beta1']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2015-7577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/10'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-cf36-985g-v73c,2023-01-23T21:12:18Z,2017-10-24T18:33:37Z,,['CVE-2013-4562'],omniauth-facebook Cross-Site Request Forgery vulnerability,"The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-facebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562'}, {'type': 'WEB', 'url': 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkdynamic/omniauth-faceboo'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/264'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/267'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-xxr8-833v-c7wc,2023-05-26T21:06:30Z,2017-10-24T18:33:38Z,,['CVE-2011-4319'],Cross-site Scripting vulnerability in i18n translations helper method,"Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an ""html"" substring.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4319'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d5b105d4bcb652550dda8b5613376d1b8beb70c'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ba2d85012088fd0db0fab98b2e512c77c83cbade'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/71364'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-4319.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228155840/http://www.securityfocus.com/bid/50722'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210307005941/http://www.securitytracker.com/id?1026342'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/11/18/8'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-q759-hwvc-m3jg,2023-08-25T20:06:33Z,2017-10-24T18:33:37Z,,['CVE-2013-1855'],actionpack Cross-site Scripting vulnerability,"The `sanitize_css` method in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle `\n` (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0698'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1855'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=921331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-1855.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0698.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:17Z', 'nvd_published_at': '2013-03-19T22:55:00Z'}" +1.4.0,GHSA-wwmf-6p58-6vj2,2023-06-12T16:42:56Z,2017-10-24T18:33:38Z,,['CVE-2006-2582'],Remote code execution in rwiki,The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0pre1'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rwiki/CVE-2006-2582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/20264'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/1949'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-ffpv-c4hm-3x6v,2023-07-31T21:08:45Z,2017-10-24T18:33:35Z,,['CVE-2016-0751'],actionpack is vulnerable to denial of service via a crafted HTTP Accept header,"actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/127967b735813cd4f263df7a50426d74e7e9cc17'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/221937c8ba1d291430ceddebbd4bdef7d3cb47d6'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/37047b779a177b911c7161052cfc34a30e1db0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0751.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128201702/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227181647/http://www.securityfocus.com/bid/81800'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/9'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-6x85-j5j2-27jx,2023-02-15T22:22:18Z,2017-10-24T18:33:36Z,,['CVE-2014-0130'],actionpack Path Traversal vulnerability,"Directory traversal vulnerability in `actionpack/lib/abstract_controller/base.rb` in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0510'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0816'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1095105'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0130.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/NkKc7vTW70o'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140518192004/http://www.securityfocus.com/bid/67244'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150319054505/http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210411041816/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:36Z', 'nvd_published_at': '2014-05-07T10:55:00Z'}" +1.4.0,GHSA-9c2j-593q-3g82,2023-06-01T19:51:36Z,2017-10-24T18:33:37Z,,['CVE-2013-1856'],activesupport Improper Input Validation vulnerability,"The `ActiveSupport::XmlMini_JDOM` backend in `lib/active_support/xml_mini/jdom.rb` in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-1856.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-x457-cw4h-hq5f,2023-06-01T19:55:21Z,2017-10-24T18:33:37Z,,['CVE-2013-0269'],JSON gem has Improper Input Validation vulnerability,"The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka ""Unsafe Object Creation Vulnerability.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130228082541/http://www.securityfocus.com/bid/57899'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160331131233/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1028.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1147.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/8'}, {'type': 'WEB', 'url': 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}, {'type': 'WEB', 'url': 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-9rf5-jm6f-2fmm,2023-08-25T22:56:38Z,2017-10-24T18:33:36Z,,['CVE-2014-3514'],Active Record subject to strong parameters protection bypass,`activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3514.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/08/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1102.html'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-v5jg-558j-q67c,2023-05-12T17:23:04Z,2017-10-24T18:33:38Z,,['CVE-2011-2931'],actionpack Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in the `strip_tags` helper in `actionpack/lib/action_controller/vendor/html-scanner/html/node.rb` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731436'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5jg-558j-q67c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2931.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-p463-639r-q9g9,2023-01-23T21:27:59Z,2017-10-24T18:33:37Z,,['CVE-2013-1756'],Dragonfly Code Injection vulnerability,"The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'fixed': '0.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '0.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103538/http://www.securityfocus.com/bid/58225'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-r8fh-hq2p-7qhq,2023-03-14T22:03:04Z,2017-10-24T18:33:36Z,,['CVE-2014-3483'],Active Record contains SQL Injection via improper range quoting,SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3483.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228150648/http://www.securityfocus.com/bid/68341'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0877.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-j838-vfpq-fmf2,2023-01-23T17:47:24Z,2017-10-24T18:33:37Z,,['CVE-2013-1857'],actionpack Cross-site Scripting vulnerability,"The sanitize helper in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded `:` (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a `:` sequence.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0698.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-85r7-w5mv-c849,2023-08-25T23:30:15Z,2017-10-24T18:33:37Z,,['CVE-2013-0262'],Rack Vulnerable to Path Traversal,"`rack/file.rb` (`Rack::File`) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted `PATH_INFO` environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka ""symlink path traversals.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909071'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909072'}, {'type': 'WEB', 'url': 'https://gist.github.com/rentzsch/4736940'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0262.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:29Z', 'nvd_published_at': '2013-02-08T20:55:00Z'}" +1.4.0,GHSA-wcm2-9c89-wmfm,2023-02-09T19:24:11Z,2017-10-24T18:33:38Z,,['CVE-2010-5312'],Cross-site Scripting in jquery-ui,Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2010-5312.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150316023043/http://www.securityfocus.com/bid/71106'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170316161850/http://www.securitytracker.com/id/1037035'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/6016'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3249'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:08Z', 'nvd_published_at': '2014-11-24T16:59:00Z'}" +1.4.0,GHSA-99ch-8mvp-g7m5,2023-01-23T16:37:19Z,2017-10-24T18:33:37Z,,['CVE-2013-1948'],md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename,`converter.rb` in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'md2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/md2pdf/CVE-2013-1948.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rwestgeest/md2pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130503194109/http://www.securityfocus.com/bid/59061'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/md2pdf-remote-exec.html'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-hjcp-j389-59ff,2021-09-14T17:23:54Z,2017-10-24T18:33:36Z,,['CVE-2015-8854'],Regular Expression Denial of Service in marked,"Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule. + + + +## Recommendation + +Update to version 0.3.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/497'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjcp-j389-59ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/chjj/marked'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/23'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-gvcj-pfq2-wxj7,2021-09-13T12:46:47Z,2017-10-24T18:33:35Z,,['CVE-2016-1202'],High severity vulnerability that affects electron,Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/2976'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN00324715/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054'}]","{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-c43v-hrmg-56r4,2023-09-05T21:12:28Z,2017-10-24T18:33:37Z,,['CVE-2013-4457'],Cocaine Gem OS Command Injection vulnerability,"The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'cocaine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/cocaine'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/10/22/10'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-2xjj-5x6h-8vmf,2023-08-25T20:14:16Z,2017-10-24T18:33:38Z,,['CVE-2012-1099'],Cross-site Scripting in actionpack,"Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_options_helper.rb` in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799276'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-1099.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2466'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-w3w8-37jv-2c58,2021-09-20T22:34:08Z,2017-10-24T18:33:36Z,,['CVE-2015-8862'],Cross-Site Scripting in mustache,"Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted. + + + +### Example +Template: +`````` + +Input: +```{ 'foo' : 'test.com onload=alert(1)'}``` + +Rendered result: +`````` + + +## Recommendation + +Update to version 2.2.1 or later. +Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862'}, {'type': 'WEB', 'url': 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3w8-37jv-2c58'}, {'type': 'PACKAGE', 'url': 'https://github.com/janl/mustache.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/62'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2016-18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96436'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-hpcf-8vf9-q4gj,2023-01-26T23:02:07Z,2017-10-24T18:33:35Z,,['CVE-2016-7103'],jQuery-UI vulnerable to Cross-site Scripting in dialog closeText,"Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function. + +jQuery-UI is a library for manipulating UI elements via jQuery. + +Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector. + + +## Recommendation + +Upgrade to jQuery-UI 1.12.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'WEB', 'url': 'https://github.com/jquery/api.jqueryui.com/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1622'}, {'type': 'WEB', 'url': 'https://github.com/jquery-ui-rails/jquery-ui-rails/commit/d504a40538fe5f7998439ad2f8fc5c4a1f843f1c'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2016-7103.yml'}, {'type': 'WEB', 'url': 'https://jqueryui.com/changelog/1.12.0/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030100/http://www.securityfocus.com/bid/104823'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2932.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2933.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0161.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:44Z', 'nvd_published_at': '2017-03-15T16:59:00Z'}" +1.4.0,GHSA-24fg-p96v-hxh8,2023-05-26T17:41:44Z,2017-10-24T18:33:38Z,,['CVE-2011-0447'],actionpack Cross-Site Request Forgery vulnerability,"Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage ""combinations of browser plugins and HTTP redirects,"" a related issue to CVE-2011-0696.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/66ce3843d32e9f2ac3b1da20067af53019bbb034'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/7e86f9b4d2b7dfa974c10ae7e6d8ef90f3d77f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0447.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170223045008/http://www.securitytracker.com/id?1025060'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-hgmw-x865-hf9x,2023-01-26T20:58:07Z,2017-10-24T18:33:36Z,,['CVE-2014-2322'],Arabic Prawn allows remote attackers to execute arbitrary commands via shell metacharacters,`lib/string_utf_support.rb` in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'Arabic-Prawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/ozeron/prawn-arabic'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/12/6'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-xxvw-45rp-3mj2,2021-09-22T18:27:56Z,2017-10-24T18:33:37Z,,['CVE-2013-4660'],Deserialization Code Execution in js-yaml,"Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer. + +## Proof of Concept +``` +const yaml = require('js-yaml'); + +const x = `test: !!js/function > +function f() { +console.log(1); +}();` + +yaml.load(x); +``` + + +## Recommendation + +Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/16'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:05:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-g89m-3wjw-h857,2023-05-12T17:09:48Z,2017-10-24T18:33:37Z,,['CVE-2012-3865'],Puppet vulnerable to Path Traversal,"Directory traversal vulnerability in `lib/puppet/reports/store.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a `..` (dot dot) in a node name.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839131'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/overview-cve-2012-3865-arbitrary-file-delete/dos-puppet-master'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3865/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-5j3g-jfq3-7jwx,2021-09-01T22:16:02Z,2017-10-24T18:33:36Z,,['CVE-2014-7205'],Arbitrary JavaScript Execution in bassmaster,"A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval. + + +## Recommendation + +Update to bassmaster version 1.5.2 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bassmaster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7205'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j3g-jfq3-7jwx'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/bassmaster'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40689/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70180'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-q44r-f2hm-v76v,2023-05-12T17:21:34Z,2017-10-24T18:33:37Z,,['CVE-2012-3867'],Pupper does not properly restrict characters in Common Name field of Certificate Signing Request,"`lib/puppet/ssl/certificate_authority.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839158'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3867.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3867-insufficient-input-validation'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3867/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-6h5q-96hp-9jgm,2023-08-25T18:48:39Z,2017-10-24T18:33:36Z,,['CVE-2013-6415'],actionpack vulnerable to Cross-site Scripting,Cross-site scripting (XSS) vulnerability in the `number_to_currency` helper in `actionpack/lib/action_view/helpers/number_helper.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6415.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6415'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131206180005/http://www.securityfocus.com/bid/64077'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-9h36-4jf2-hx53,2023-01-23T20:56:41Z,2017-10-24T18:33:37Z,,['CVE-2013-1802'],extlib does not properly restrict casts of string values,"The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'extlib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917233'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/extlib'}, {'type': 'WEB', 'url': 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/extlib/CVE-2013-1802.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-r7q2-5gqg-6c7q,2023-05-12T17:22:22Z,2017-10-24T18:33:38Z,,['CVE-2011-2929'],actionpack Improper Input Validation vulnerability,"The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a ""filter skipping vulnerability.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2929.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-rprj-g6xc-p5gq,2023-07-04T00:25:07Z,2017-10-24T18:33:37Z,,['CVE-2013-4413'],Wicked gem contains Path traversal vulnerability,The Wicked gem prior to v1.0.1 allows a remote attacker to traverse directories on the system via a vulnerability in `controller/concerns/render_redirect.rb`. An attacker can send a specially-crafted URL request containing `%2E%2E%2F` directory traversal sequences to read arbitrary files on the system.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'wicked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'}, {'type': 'WEB', 'url': 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/wicked/CVE-2013-4413.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schneems/wicked'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210508170740/http://www.securityfocus.com/bid/62891'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/43'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-cj43-9h3w-v976,2022-10-04T21:44:45Z,2017-10-24T18:33:37Z,,['CVE-2013-4761'],Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service,"Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified ""local file system access"" to the Puppet Master.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.23'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-4761-resourcetype-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2013-4761/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2761'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-w248-xr37-jx8m,2023-08-28T13:51:43Z,2017-10-24T18:33:37Z,,['CVE-2013-2615'],fastreader Gem for Ruby URI Handling Arbitrary Command Injection,fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'fastreader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fastreader/CVE-2013-2615.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/122'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-4ww3-3rxj-8v6q,2023-05-12T15:23:22Z,2017-10-24T18:33:38Z,,['CVE-2011-0449'],actionpack allows remote attackers to bypass intended access restrictions,"`actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6f80224057803f85b3f448936aae89e742452c3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionpack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0449.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207190612/http://securitytracker.com/id?1025061'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-34r7-q49f-h37c,2021-10-29T14:15:03Z,2017-10-24T18:33:36Z,,['CVE-2015-8857'],Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js,"Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification. + +## Recommendation + +Upgrade UglifyJS to version >= 2.4.24.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.24'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uglifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}, {'type': 'WEB', 'url': 'https://github.com/mishoo/UglifyJS2/issues/751'}, {'type': 'WEB', 'url': 'https://github.com/lautis/uglifier/commit/4677bfe38142937ff952f95605bcec4618892c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mishoo/UglifyJS2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uglifier/CVE-2015-8857.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190830/http://www.securityfocus.com/bid/96410'}, {'type': 'WEB', 'url': 'https://zyan.scripts.mit.edu/blog/backdooring-js/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-1254', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:00Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}" +1.4.0,GHSA-wpw7-wxjm-cw8r,2023-08-25T19:25:00Z,2017-10-24T18:33:36Z,,['CVE-2013-6417'],actionpack allows bypass of database-query restrictions,"`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806051251/https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0469.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:55Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}" +1.4.0,GHSA-cqr7-78pj-3g7j,2021-09-09T20:31:02Z,2017-10-24T18:33:36Z,,['CVE-2014-3742'],File Descriptor Leak Can Cause DoS Vulnerability in hapi,"Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak. + +When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified. + + + +## Recommendation + +- Please upgrade to version 2.2.x or above as soon as possible.",[],"[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/issues/1427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-3crr-9vmg-864v,2023-08-25T23:15:31Z,2017-10-24T18:33:37Z,,['CVE-2013-1854'],Active Record Improper Input Validation,"The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0699'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=921329'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-1854.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0699.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:54Z', 'nvd_published_at': '2013-03-19T22:55:00Z'}" +1.4.0,GHSA-p673-hjf2-pwfr,2023-07-03T23:38:02Z,2017-10-24T18:33:37Z,,['CVE-2013-1875'],Shell command injection in command_wrap,command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'command_wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/command_wrap/CVE-2013-1875.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/slicertje/commandwrap'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/175'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-q86f-fmqf-qrf6,2023-09-05T21:08:32Z,2017-10-24T18:33:36Z,,['CVE-2015-9097'],Mail Gem CRLF Injection vulnerability,"The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/215'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/pull/1097'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/137631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q86f-fmqf-qrf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/mail-OSVDB-131677'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/12/11/3'}, {'type': 'WEB', 'url': 'http://www.mbsd.jp/Whitepaper/smtpi.pdf'}]","{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-mhwp-qhpc-h3jm,2023-03-14T20:49:26Z,2017-10-24T18:33:36Z,,['CVE-2014-3482'],SQL Injection in Active Record,SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0876.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-m7fq-cf8q-35q7,2023-01-23T21:21:34Z,2017-10-24T18:33:37Z,,['CVE-2013-1800'],crack does not properly restrict casts of string values,"The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'crack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=804721'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/crack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/crack/CVE-2013-1800.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html'}]","{'cwe_ids': ['CWE-704', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-959j-5g9v-3fpq,2023-08-25T22:59:09Z,2017-10-24T18:33:36Z,,['CVE-2014-1234'],Paratrooper-newrelic Exposes of Sensitive Information to an Unauthorized Actor,The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-newrelic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-newrelic/CVE-2014-1234.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/2'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-33pp-3763-mrfp,2023-03-01T18:54:54Z,2017-10-24T18:33:36Z,,['CVE-2014-7819'],sprockets vulnerable to Path Traversal,"Multiple directory traversal vulnerabilities in `server.rb` in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1161527'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:55Z', 'nvd_published_at': '2014-11-08T11:55:00Z'}" +1.4.0,GHSA-4whc-pp4x-9pf3,2023-01-20T22:28:49Z,2017-10-24T18:33:36Z,,['CVE-2015-1840'],jquery-rails and jquery-ujs subject to Exposure of Sensitive Information,"jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ujs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/jquery-rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ujs/CVE-2015-1840.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084945/http://www.securityfocus.com/bid/75239'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/15'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-vxp4-25qp-86qh,2020-06-17T15:15:14Z,2017-10-24T18:33:36Z,2020-06-17T15:15:14Z,[],Moderate severity vulnerability that affects ember,"Withdrawn, accidental duplicate publish. + +Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxp4-25qp-86qh'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-ghqm-pgxj-37gq,2023-01-23T21:16:04Z,2017-10-24T18:33:36Z,,['CVE-2015-7580'],rails-html-sanitizer Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in `lib/rails/html/scrubbers.rb` in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/15'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-75w6-p6mg-vh8j,2023-05-26T16:09:49Z,2017-10-24T18:33:38Z,,['CVE-2011-0446'],Rails actionpack gem vulnerable to Cross-site Scripting,"Multiple cross-site scripting (XSS) vulnerabilities in the `mail_to` helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/abe97736b8316f1b714cac56c115c0779aa73217'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e3dd2107c57a8efaaea5d61cf8da65f7444760b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812054342/http://www.securitytracker.com/id?1025064'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-q5pq-pgrv-fh89,2023-09-05T23:30:40Z,2017-10-24T18:33:36Z,,['CVE-2014-9682'],dns-sync command injection vulnerability,The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.,[],"[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89'}, {'type': 'PACKAGE', 'url': 'https://github.com/skoranga/node-dns-sync'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/11/11/6'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-699m-mcjm-9cw8,2023-08-25T19:05:47Z,2017-10-24T18:33:37Z,,['CVE-2013-4491'],actionpack vulnerable to Cross-site Scripting,Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-699m-mcjm-9cw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-4491.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-3m6r-39p3-jq25,2022-04-25T16:34:57Z,2017-10-24T18:33:35Z,,['CVE-2016-6582'],Doorkeeper is vulnerable to replay attacks,The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2016-6582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214021758/http://www.securityfocus.com/bid/92551'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207202519/http://www.securityfocus.com/archive/1/539268/100/0/threaded'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Aug/105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/19/2'}]","{'cwe_ids': ['CWE-1254'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-q34c-48gc-m9g8,2023-05-12T17:20:28Z,2017-10-24T18:33:38Z,,['CVE-2012-2694'],"actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request","`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2694.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-xwg4-93c6-3h42,2021-09-22T17:58:56Z,2017-10-24T18:33:36Z,,['CVE-2014-6394'],Directory Traversal in send,"Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. + +For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`. + + +## Recommendation + +Update to version 0.8.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwg4-93c6-3h42'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/send'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT205217'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/32'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/24/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70100'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-rg5m-3fqp-6px8,2023-07-04T00:18:31Z,2017-10-24T18:33:37Z,,['CVE-2013-4389'],actionmailer email address processing causes Denial of service,Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4389'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionmailer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2887'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]","{'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-229r-pqp6-8w6g,2023-08-29T15:58:19Z,2017-10-24T18:33:36Z,,['CVE-2013-6421'],sprout Arbitrary Code Execution vulnerability,The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'sprout'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.7.246']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6421'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukebayes/project-sprouts'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sprout/CVE-2013-6421.yml'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/6'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-4936-rj25-6wm6,2023-01-20T22:08:42Z,2017-10-24T18:33:37Z,,['CVE-2013-0285'],nori contains Improper Input Validation,"The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/2ca6f8603e406f884a8fcea6bc26f8f6bf168f40'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/4bcf59abdcec6bcd1153241b122eda61a494e4fb'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/818f5263b1d597b603d46cbe1702cd2717259e32'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c3fdce7a2d2670b44f1cda35da0ae73cc1372084'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c5e07f5c32e615f0a4a7ee2782d37f7a33261be4'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/d9b68667249b98776fb23ba9e9c548dc4b524709'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4936-rj25-6wm6'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nori/CVE-2013-0285.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/savonrb/nori'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-9959-c6q6-6qp3,2020-06-17T16:30:41Z,2017-10-24T18:33:36Z,2020-06-17T16:30:41Z,[],Moderate severity vulnerability that affects validator,**Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q,[],"[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9959-c6q6-6qp3'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-rgr4-9jh5-j4j6,2023-03-14T21:47:07Z,2017-10-24T18:33:36Z,,['CVE-2015-3225'],Rack vulnerable to Denial of Service via large parameter depth request,"lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/HISTORY.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/14'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2290.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3322'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-rp63-jfmw-532w,2023-09-05T22:04:31Z,2017-10-24T18:33:38Z,,['CVE-2012-2140'],Mail Gem Improper Input Validation vulnerability,The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-333x-9vgq-v2j4,2021-08-31T20:33:50Z,2017-10-24T18:33:36Z,,['CVE-2015-5688'],Directory Traversal in geddy,"Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors. + +### Proof of Concept +``` +http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd +``` + + +## Recommendation + +Update geddy to version >= 13.0.8",[],"[{'package': {'ecosystem': 'npm', 'name': 'geddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/issues/697'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/pull/699'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333x-9vgq-v2j4'}, {'type': 'PACKAGE', 'url': 'https://github.com/geddy/geddy'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/releases/tag/v13.0.8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/10'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-jgqf-hwc5-hh37,2021-09-14T19:42:25Z,2017-10-24T18:33:36Z,,['CVE-2015-8859'],Root Path Disclosure in send,"Versions of `send` prior to 0.11.2 are affected by an information leakage vulnerability which may allow an attacker to enumerate paths on the server filesystem. + + + +## Recommendation + +Update to version 0.11.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8859'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/pull/70'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/commit/98a5b89982b38e79db684177cf94730ce7fc7aed'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillarjs/send'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227192016/https://www.securityfocus.com/bid/96435/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-fgmx-8h93-26fh,2023-01-25T23:20:49Z,2017-10-24T18:33:37Z,,['CVE-2012-6134'],omniauth-oauth2 Cross-Site Request Forgery vulnerability,Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem prior to 1.1.1 for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/intridea/omniauth-oauth2/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-oauth2/CVE-2012-6134.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170312020947/https://gist.github.com/homakov/3673012'}, {'type': 'WEB', 'url': 'http://rubysec.github.io/advisories/CVE-2012-6134/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-fg9w-g6m4-557j,2023-05-26T17:12:19Z,2017-10-24T18:33:38Z,,['CVE-2009-3086'],actionpack and activesupport vulnerable to information leaks,"A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d460c9a25560f43e7c3789abadf7b455053eb686'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/http://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090907001716/http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229150042/http://www.securityfocus.com/bid/37427'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-pr3r-4wrp-r2pv,2023-07-04T00:01:26Z,2017-10-24T18:33:35Z,,['CVE-2016-6317'],ActiveRecord in Ruby on Rails allows database-query bypass,"Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain ""[nil]"" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/4'}]","{'cwe_ids': ['CWE-284', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-qv8p-v9qw-wc7g,2023-01-23T18:01:41Z,2017-10-24T18:33:38Z,,['CVE-2012-1098'],activesupport Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799275'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-f522-ffg8-j8r6,2021-09-09T21:38:37Z,2017-10-24T18:33:35Z,,['CVE-2016-2537'],Regular Expression Denial of Service in is-my-json-valid,"Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. + + +## Recommendation + +Update to version 1.4.1, 2.17.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317548'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f522-ffg8-j8r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mafintosh/is-my-json-valid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/572'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/76'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-c9f4-xj24-8jqx,2021-09-08T21:59:09Z,2017-10-24T18:33:36Z,,['CVE-2015-8858'],Regular Expression Denial of Service in uglify-js,"Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method. + + +### Proof of Concept + +``` +var u = require('uglify-js'); +var genstr = function (len, chr) { + var result = """"; + for (i=0; i<=len; i++) { + result = result + chr; + } + + return result; +} + +u.parse(""var a = "" + genstr(process.argv[2], ""1"") + "".1ee7;""); +``` + +### Results +``` +$ time node test.js 10000 +real 0m1.091s +user 0m1.047s +sys 0m0.039s + +$ time node test.js 80000 +real 0m6.486s +user 0m6.229s +sys 0m0.094s +``` + + +## Recommendation + +Update to version 2.6.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/48'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96409'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-m6f7-46hw-grcj,2023-03-14T20:44:40Z,2017-10-24T18:33:37Z,,['CVE-2013-2090'],Creme Fraiche contains OS Command Injection,The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'cremefraiche'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-67j6-xv27-w6ww,2023-03-14T23:11:59Z,2017-10-24T18:33:36Z,,['CVE-2015-3224'],Web Console (Ruby gem) contains whitelisted_ips bypass,"request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/web-console'}, {'type': 'WEB', 'url': 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/web-console/CVE-2015-3224.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/18'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-x6fg-f45m-jf5q,2021-09-21T22:15:35Z,2017-10-24T18:33:36Z,,['CVE-2015-8855'],Regular Expression Denial of Service in semver,"Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. + + + +## Recommendation + +Update to version 4.3.2 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/31'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/86957'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-r23g-3qw4-gfh2,2023-08-28T19:55:45Z,2017-10-24T18:33:37Z,,['CVE-2012-6684'],RedCloth Cross-site Scripting vulnerability,Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a `javascript:` URI.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684'}, {'type': 'WEB', 'url': 'https://co3k.org/blog/redcloth-unfixed-xss-en'}, {'type': 'WEB', 'url': 'https://gist.github.com/co3k/75b3cb416c342aa1414c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/RedCloth/CVE-2012-6684.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/50'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3168'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-rh6c-q938-3r9q,2021-09-17T18:17:08Z,2017-10-24T18:33:36Z,,['CVE-2013-7452'],Moderate severity vulnerability that affects validator,The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-hxx6-p24v-wg8c,2023-08-29T10:57:50Z,2017-10-24T18:33:37Z,,['CVE-2013-2617'],Curl Gem insufficient URL escaping command injection,`lib/curl.rb` in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'curl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2617'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curl/CVE-2013-2617.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tggo/curl'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-gcqq-w6gr-h9j9,2023-01-26T20:55:34Z,2017-10-24T18:33:35Z,,['CVE-2017-5946'],Directory traversal vulnerability in RubyZip,"The `Zip::File` component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses `../` pathname substrings to write arbitrary files to the filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/315'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2017-5946.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/releases'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227185727/http://www.securityfocus.com/bid/96445'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3801'}]","{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-p4c6-77gc-694x,2023-05-11T13:54:28Z,2017-10-24T18:33:38Z,,['CVE-2007-6077'],session fixation protection mechanism in cgi_process.rb in Rails,"The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p4c6-77gc-694x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-6077.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/changeset/8177'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/10048'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27781'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26598'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4009'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-f7p5-w2cr-7cp7,2023-05-12T17:27:38Z,2017-10-24T18:33:37Z,,['CVE-2013-3567'],Puppet Improper Input Validation vulnerability,"Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.22'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-3567/'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2715'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1886-1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-pc3m-v286-2jwj,2023-01-23T17:59:42Z,2017-10-24T18:33:35Z,,['CVE-2016-6316'],actionview Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as ""HTML safe"" and used as attribute values in tag handlers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.0.1'}]}], 'versions': ['5.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1856.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1857.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1858.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3651'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-6h88-qjpv-p32m,2022-04-25T16:33:57Z,2017-10-24T18:33:35Z,,['CVE-2016-7798'],OpenSSL gem for Ruby using inadequate encryption strength,"The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/49'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h88-qjpv-p32m'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/openssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openssl/CVE-2016-7798.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210121065227/https://www.securityfocus.com/bid/93031/info'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2017/dsa-3966'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/19/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/30/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/10/01/2'}]","{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-gm25-fpmr-43fj,2023-05-11T13:41:22Z,2017-10-24T18:33:38Z,,['CVE-2007-3227'],Moderate severity vulnerability that affects rails,Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm25-fpmr-43fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-3227.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8371'}, {'type': 'WEB', 'url': 'http://osvdb.org/36378'}, {'type': 'WEB', 'url': 'http://pastie.caboo.se/65550.txt'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/25699'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27756'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_24_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/24161'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/2216'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-cpjc-p7fc-j9xh,2023-01-23T21:15:08Z,2017-10-24T18:33:38Z,,['CVE-2011-0739'],Mail Improper Input Validation vulnerability,The deliver function in the sendmail delivery agent (`lib/mail/network/delivery_methods/sendmail.rb`) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0739'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-h56m-vwxc-3qpw,2023-08-25T19:56:49Z,2017-10-24T18:33:36Z,,['CVE-2014-7829'],Directory traversal vulnerability in actionpack,"Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h56m-vwxc-3qpw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7829.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rMTQy4oRCGk'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160403085126/http://www.securityfocus.com/bid/71183'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:46Z', 'nvd_published_at': '2014-11-18T23:59:00Z'}" +1.4.0,GHSA-98mf-8f57-64qf,2023-01-23T16:34:24Z,2017-10-24T18:33:37Z,,['CVE-2012-3463'],actionpack Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_tag_helper.rb` in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the `prompt` field to the `select_tag` helper.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6d0526db91afb0675c2ad3d871529d1536303c64'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/fV3QUToSMSw/m/eHBSFOUYHpYJ?pli=1'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-p692-7mm3-3fxg,2023-07-31T20:59:11Z,2017-10-24T18:33:36Z,,['CVE-2015-7576'],actionpack is vulnerable to remote bypass authentication,"The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/17e6f1507b7f2c2a883c180f4f9548445d6dfbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7576.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81803'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/8'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-92v7-pq4h-58j5,2023-06-07T14:06:11Z,2017-10-24T18:33:36Z,,['CVE-2014-3248'],"facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability","Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) `rubygems/defaults/operating_system.rb`, (2) `Win32API.rb`, (3) `Win32API.so`, (4) `safe_yaml.rb`, (5) `safe_yaml/deep.rb`, or (6) `safe_yaml/deep.so`; or (7) `operatingsystem.rb`, (8) `operatingsystem.so`, (9) `osfamily.rb`, or (10) `osfamily.so` in `puppet/confine`.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'hiera'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.26'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mcollective-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/facter/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hiera/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mcollective-client/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20141129061319/http://www.securityfocus.com/bid/68035'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150204183209/http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150907182402/http://puppetlabs.com/security/cve/cve-2014-3248'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:08Z', 'nvd_published_at': '2014-11-16T17:59:00Z'}" +1.4.0,GHSA-hgpp-pp89-4fgf,2023-08-25T23:26:17Z,2017-10-24T18:33:38Z,,['CVE-2012-2660'],Action Pack contains database-query restrictions bypass,"`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `[nil]` values, a related issue to CVE-2012-2694.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8SA-M3as7A8/m/Mr9fi9X4kNgJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-29gr-w57f-rpfw,2023-08-25T19:41:02Z,2017-10-24T18:33:36Z,,['CVE-2014-7818'],actionpack vulnerable to Path Traversal,"Directory traversal vulnerability in `actionpack/lib/action_dispatch/middleware/static.rb` in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when `serve_static_assets` is enabled, allows remote attackers to determine the existence of files outside the application root via a `/..%2F` sequence.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gr-w57f-rpfw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7818.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dCp7duBiQgo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:48Z', 'nvd_published_at': '2014-11-08T11:55:00Z'}" +1.4.0,GHSA-xgr2-v94m-rc9g,2023-08-25T20:10:51Z,2017-10-24T18:33:37Z,,['CVE-2013-0333'],activesupport in Rails vulnerable to incorrect data conversion,"`lib/active_support/json/backends/yaml.rb` in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.2'}, {'fixed': '2.3.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0202'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0203'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=903440'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-0333.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0333'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0201.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0202.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0203.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2613'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:24Z', 'nvd_published_at': '2013-01-30T12:00:00Z'}" +1.4.0,GHSA-9hx9-w2j6-rw76,2023-07-05T18:52:49Z,2017-10-24T18:33:37Z,,['CVE-2013-2105'],Script Injection in Show In Browser gem,The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on `/tmp/browser.html`.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'show_in_browser'}, 'versions': ['0.0.3']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/show_in_browser/CVE-2013-2105.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/show_in_browser.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/05/18/4'}]","{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-7fqj-cg79-f2pv,2023-08-28T13:54:43Z,2017-10-24T18:33:37Z,,['CVE-2013-1898'],Thumbshooter vulnerable to Code Injection,lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'thumbshooter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898'}, {'type': 'PACKAGE', 'url': 'https://github.com/digineo/thumbshooter'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thumbshooter/CVE-2013-1898.yml'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/218'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/3'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-j5hj-fhc9-g24m,2023-01-23T21:18:15Z,2017-10-24T18:33:35Z,,['CVE-2016-4442'],rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects,The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'}, {'type': 'PACKAGE', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/10/2'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-h835-75hw-pj89,2023-01-23T17:34:24Z,2017-10-24T18:33:37Z,,['CVE-2012-3464'],activesupport Cross-site Scripting vulnerability,"Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.rb` in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/7215'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/28f2c6f4037081da0a82104a3f473165ed4ed2ce'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/780a718723cf87b49cfe204d355948c4e0932d23'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d0c9759d3aeb6327d68dd6c0de0fe2fed4e3c870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h835-75hw-pj89'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2012-3464.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/50694'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-gh2w-j7cx-2664,2023-03-14T19:07:57Z,2017-10-24T18:33:37Z,,['CVE-2012-6496'],Active Record contains SQL Injection,"SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=889649'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0220.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201401-22.xml'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-9wrq-xvmp-xjc8,2021-12-01T19:40:37Z,2017-10-24T18:33:38Z,,['CVE-2006-4112'],High severity vulnerability that affects rails.,"Unspecified vulnerability in the ""dependency resolution mechanism"" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or ""data loss,"" a different vulnerability than CVE-2006-4111.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4112.yml'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21424'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/699540'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/442934/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-jwhv-rgqc-fqj5,2023-05-11T13:50:52Z,2017-10-24T18:33:38Z,,['CVE-2007-5380'],Session fixation vulnerability in Rails ,"Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to ""URL-based sessions.""",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5380.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27965'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_25_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-hxhj-hp9m-qwc4,2023-01-23T17:38:44Z,2017-11-29T23:21:05Z,,['CVE-2017-0904'],private_address_check vulnerable to bypass of Resolv.getaddresses method,"The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's `Resolv.getaddresses` method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287245'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287835'}, {'type': 'WEB', 'url': 'https://edoverflow.com/2017/ruby-resolv-bug/'}]","{'cwe_ids': ['CWE-242'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-x7p2-x2j6-mwhr,2023-08-29T12:26:53Z,2017-11-29T23:19:51Z,,['CVE-2017-16833'],"Gemirro Stored XSS in Gemspec ""homepage"" value","Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the ""homepage"" value of a "".gemspec"" file. +A "".gemspec"" file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload to the Gemirro server, in order to achieve stored XSS via the author name hyperlink.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'gemirro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}, {'type': 'WEB', 'url': 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}, {'type': 'PACKAGE', 'url': 'https://github.com/PierreRambaud/gemirro'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gemirro/CVE-2017-16833.yml'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-7qcx-jmrc-h2rr,2021-09-03T21:41:16Z,2017-11-15T19:44:16Z,,['CVE-2017-15878'],Cross-Site Scripting in keystone,"Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser. + + +## Recommendation + +Update to version 4.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43054/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/980'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-rph7-j9qr-h8q8,2021-09-17T19:23:32Z,2017-11-28T22:20:17Z,,['CVE-2013-7377'],Potential Command Injection in codem-transcode,"When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution. + +### Mitigating Factors: +The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default. + + +## Recommendation + +An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'codem-transcode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-hwcf-pp87-7x6p,2023-09-08T21:35:56Z,2017-11-30T23:15:05Z,,['CVE-2017-1000188'],mde ejs vulnerable to XSS,nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the `ejs.renderFile()` resulting in code injection,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ejs'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227134555/http://www.securityfocus.com/bid/101889'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-5c8j-xr24-2665,2021-09-01T21:34:20Z,2017-11-28T22:44:52Z,,['CVE-2014-3741'],Potential Command Injection in printer,"Versions 0.0.1 and earlier of `printer` are affected by a command injection vulnerability resulting from a failure to sanitize command arguments properly in the `printDirect()` function. + + + +## Recommendation + +Update to version 0.0.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'printer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3741'}, {'type': 'WEB', 'url': 'https://github.com/tojocky/node-printer/commit/e001e38738c17219a1d9dd8c31f7d82b9c0013c7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8j-xr24-2665'}, {'type': 'PACKAGE', 'url': 'https://github.com/tojocky/node-printer'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/27'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-pjj4-w39g-pw54,2023-01-26T21:23:13Z,2017-11-21T18:26:40Z,,['CVE-2017-15928'],Ox gem crashes due to a crafted input,"In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to `parse_obj`. NOTE: the vendor has stated ""Ox should handle the error more gracefully"" but has not confirmed a security implication.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-15928.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/ox/versions/2.8.0'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-q43c-g2g7-6gxj,2021-06-10T21:18:39Z,2017-11-30T23:14:47Z,,['CVE-2017-16570'],Cross-Site Request Forgery (CSRF) in keystone,"Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints. + + +## Recommendation + +Update to version 4.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43922/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/979'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-5v3f-73gv-x7x5,2023-08-28T10:13:34Z,2017-11-15T20:41:14Z,,['CVE-2017-7475'],cairo is vulnerable to denial of service due to a null pointer dereference,Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the `FT_Load_Glyph` and `FT_Render_Glyph` resulting in an application crash.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'cairo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.4'}, {'fixed': '1.15.5'}]}], 'versions': ['1.15.4']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7475'}, {'type': 'WEB', 'url': 'https://bugs.freedesktop.org/show_bug.cgi?id=100763'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7475'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcairo/rcairo'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cairo/CVE-2017-7475.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2017/q2/151'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:22Z', 'nvd_published_at': '2017-05-19T20:29:00Z'}" +1.4.0,GHSA-653m-r33x-39ff,2023-03-14T23:07:43Z,2017-11-29T23:20:14Z,,['CVE-2017-16792'],Geminabox contains Cross-site Scripting,"Stored cross-site scripting (XSS) vulnerability in ""geminabox"" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the ""homepage"" value of a "".gemspec"" file, related to views/gem.erb and views/index.erb.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/geminabox/versions/0.13.10'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-wwh7-4jw9-33x6,2023-08-29T16:04:20Z,2017-11-28T22:44:42Z,,['CVE-2017-16516'],yajl-ruby gem Denial of Service vulnerability,"In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to `Yajl::Parser.new.parse`, the whole ruby process crashes with a SIGABRT in the `yajl_string_decode` function in `yajl_encode.c`. This results in the whole ruby process terminating and potentially a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'yajl-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16516'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/pull/178'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/2158'}, {'type': 'WEB', 'url': 'https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianmario/yajl-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yajl-ruby/CVE-2017-16516.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2017/11/msg00010.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00003.html'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/yajl-ruby'}]","{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-7cv6-gvx3-m54m,2021-06-11T13:54:39Z,2017-11-16T01:47:02Z,,['CVE-2017-15881'],Cross-Site Scripting in keystone,"Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account. + + +## Recommendation + +Update to version 4.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/981'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-q97v-764g-r2rp,2023-01-23T21:34:16Z,2017-11-16T01:47:37Z,,['CVE-2014-9489'],gollum and gollum-lib allow remote authenticated users to execute arbitrary code,"The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the `-O` or `--open-files-in-pager` flags.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'gollum-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/issues/913'}, {'type': 'WEB', 'url': 'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gollum/gollum'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229041306/http://www.securityfocus.com/bid/71499'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/03/19'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-3w5v-p54c-f74x,2023-09-08T20:54:25Z,2017-11-30T23:15:19Z,,['CVE-2017-1000228'],ejs is vulnerable to remote code execution due to weak input validation,nodejs ejs versions older than 2.5.3 is vulnerable to remote code execution due to weak input validation in `ejs.renderFile()` function,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.5.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w5v-p54c-f74x'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ejs:20161128'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041219/http://www.securityfocus.com/bid/101897'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-wmjf-jpjj-9f3j,2023-08-28T13:43:41Z,2017-11-15T20:39:47Z,,['CVE-2017-8418'],RuboCop gem Insecure use of /tmp,"RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit this to tamper with cache files belonging to other users.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubocop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.49.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8418'}, {'type': 'WEB', 'url': 'https://github.com/bbatsov/rubocop/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/rubocop/rubocop/commit/dcb258fabd5f2624c1ea0e1634763094590c09d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/bbatsov/rubocop'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubocop/CVE-2017-8418.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/01/14'}]","{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-3v3c-r5v2-68ph,2023-01-20T22:07:25Z,2017-11-30T23:14:55Z,,['CVE-2017-0909'],private_address_check contains Incomplete List of Disallowed Inputs,The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete blacklist of common private/local network addresses used to prevent server-side request forgery.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0909'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v3c-r5v2-68ph'}, {'type': 'PACKAGE', 'url': 'https://github.com/jtdowney/private_address_check'}]","{'cwe_ids': ['CWE-184'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-mw35-24gh-f82w,2023-09-08T19:56:20Z,2017-11-15T20:41:51Z,,['CVE-2017-7474'],keycloak-connect and keycloak-js improperly handle invalid tokens,"It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'keycloak-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-1203.html'}]","{'cwe_ids': ['CWE-253'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-6494-v9fq-fgq2,2022-04-25T22:05:05Z,2017-11-16T01:46:50Z,,['CVE-2017-15879'],Keystone is vulnerable to CSV injection,CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15879'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6494-v9fq-fgq2'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43053/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-x27v-x225-gq8g,2023-08-29T15:38:45Z,2017-12-06T16:43:00Z,,['CVE-2017-0905'],Recurly gem Server-Side Request Forgery in Resource#find method,"The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource#find` method that could result in compromise of API keys or other critical resources.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'PACKAGE', 'url': 'https://github.com/recurly/recurly-client-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/recurly/CVE-2017-0905.yml'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-gj4p-3wh3-2rmf,2023-07-05T17:53:08Z,2017-12-21T00:47:25Z,,['CVE-2017-17042'],Arbitrary file read vulnerability in yard server,"`lib/yard/core_ext/file.rb` in the server in YARD before 0.9.11 does not block relative paths with an initial `../` sequence, which allows attackers to conduct directory traversal attacks and read arbitrary files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17042'}, {'type': 'WEB', 'url': 'https://github.com/lsegal/yard/commit/b0217b3e30dc53d057b1682506333335975e62b4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gj4p-3wh3-2rmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/lsegal/yard'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/yard/CVE-2017-17042.yml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-vx5c-87qx-cv6c,2021-06-10T20:06:12Z,2017-12-18T22:27:45Z,,['CVE-2017-1001002'],Arbitrary Code Execution in mathjs,"math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. + + +## Recommendation + +Update to version 3.17.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/552'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-pv8x-p9hq-j328,2023-09-12T18:41:33Z,2017-12-18T22:27:53Z,,['CVE-2017-1001003'],Arbitrary Code Execution in mathjs,"math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. + + +## Recommendation + +Upgrade to version 3.17.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mathjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pv8x-p9hq-j328'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/551'}]","{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-3rpr-mg43-xhq4,2023-09-13T22:14:09Z,2017-12-21T00:47:20Z,,['CVE-2017-17068'],auth0-js Privilege Escalation Vulnerability,A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions < 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with `auth0.popup.callback()`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-17068'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3rpr-mg43-xhq4'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:17Z', 'nvd_published_at': '2017-12-06T19:29:00Z'}" +1.4.0,GHSA-7fpw-cfc4-3p2c,2023-06-21T22:00:08Z,2017-12-28T22:51:45Z,2023-06-21T22:00:08Z,[],Duplicate advisory: High severity vulnerability that affects passport-wsfed-saml2,"## Duplicate advisory +This advisory has been withdrawn because it is a duplicate of GHSA-77fw-rf4v-vfp9. This link is maintained to preserve external references. + +## Original Description +A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16897'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2017-16897'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-h9mj-fghc-664w,2021-09-14T17:16:40Z,2017-12-28T22:51:58Z,,['CVE-2017-10910'],Denial of Service in mqtt,"Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. + +The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. + +## Proof of Concept + +The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead. +``` +var mqttp = require('mqtt-packet'); +var packets = []; +for(var i=0; i<=1000;i++){ + packets.push( + mqttp.generate({ + cmd:'publish', + topic:Buffer.from('hello'), + payload:Buffer.from('world'), + retain: false, + dup: false, + messageId: ++i, + qos: 1 + }) + ) +} + +``` + + +## Recommendation + +Update to version 2.15.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mqtt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9mj-fghc-664w'}, {'type': 'PACKAGE', 'url': 'https://github.com/mqttjs/MQTT.js'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN45494523/index.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/555'}]","{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-pm9p-9926-w68m,2021-09-16T18:15:09Z,2017-12-28T22:52:47Z,,['CVE-2016-10703'],Denial of Service in ecstatic,"`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. + + +[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/) + +``` +A payload of 22kB caused a lag of 1 second, +A payload of 35kB caused a lag of 3 seconds, +A payload of 86kB caused the server to crash +``` + + +## Recommendation + +Update to version 2.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2016-4450'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pm9p-9926-w68m'}, {'type': 'PACKAGE', 'url': 'https://github.com/jfhbrook/node-ecstatic'}, {'type': 'WEB', 'url': 'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/553'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:34Z', 'nvd_published_at': '2017-12-14T19:29:00Z'}" +1.4.0,GHSA-2w67-526p-gm73,2023-03-14T21:11:23Z,2017-12-06T16:41:25Z,,['CVE-2017-1000248'],redis-store deserializes untrusted data,Redis-store prior to 1.4.0 allows unsafe objects to be loaded from redis,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'redis-store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000248'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704'}, {'type': 'WEB', 'url': 'https://github.com/redis-store/redis-store/commit/e0c1398d54a9661c8c70267c3a925ba6b192142e'}, {'type': 'PACKAGE', 'url': 'https://github.com/redis-store/redis-store'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/redis-store/CVE-2017-1000248.yml'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-8c56-cpmw-89x7,2021-06-30T18:05:23Z,2017-12-13T21:38:24Z,,['CVE-2017-9050'],Out-of-bounds read in nokogiri,"libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201711-01'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3952'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/05/15/1'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:13Z', 'nvd_published_at': '2017-05-18T06:29:00Z'}" +1.4.0,GHSA-3f5c-4qxj-vmpf,2023-09-05T22:34:28Z,2017-12-05T02:04:14Z,,['CVE-2017-16877'],Next.js Directory Traversal Vulnerability,"Next.js before 2.4.1 has directory traversal under the `/_next` and `/static` request namespace, allowing attackers to obtain sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16877'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3f5c-4qxj-vmpf'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}, {'type': 'WEB', 'url': 'https://github.com/zeit/next.js/releases/tag/2.4.1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:56Z', 'nvd_published_at': None}"