commit by to_remotes 2024-08-23 10:19:35 +0200 from cicd
parent
2394c25058
commit
19acabaed0
|
|
@ -1 +1 @@
|
||||||
2024-08-23T07:39:42+02:00
|
2024-08-23T10:19:34+02:00
|
||||||
|
|
|
||||||
|
|
@ -1 +1 @@
|
||||||
{"version":"0.9.1","created_at":"2024-08-23 07:39:41 +0200","results":[]}
|
{"version":"0.9.1","created_at":"2024-08-23 10:19:34 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-28103.yml","id":"CVE-2024-28103","url":"https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7","title":"Missing security headers in Action Pack on non-HTML responses","date":"2024-06-04","description":"Permissions-Policy is Only Served on HTML Content-Type\n\nThe application configurable Permissions-Policy is only served\non responses with an HTML related Content-Type.\n\nThis has been assigned the CVE identifier CVE-2024-28103.\n\nVersions Affected: >= 6.1.0\nNot affected: < 6.1.0\nFixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4\n\nImpact\n------\n\nResponses with a non-HTML Content-Type are not serving the configured\nPermissions-Policy. There are certain non-HTML Content-Types that\nwould benefit from having the Permissions-Policy enforced.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\n\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series\n* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series\n* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!\n","cvss_v2":null,"cvss_v3":5.4,"cve":"2024-28103","osvdb":null,"ghsa":"fwhr-88qx-h9g7","unaffected_versions":["< 6.1.0"],"patched_versions":["~> 6.1.7.8","~> 7.0.8.4","~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-32464.yml","id":"CVE-2024-32464","url":"https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6","title":"ActionText ContentAttachment can Contain Unsanitized HTML","date":"2024-06-04","description":"Instances of ActionText::Attachable::ContentAttachment included\nwithin a rich_text_area tag could potentially contain unsanitized HTML.\n\nThis has been assigned the CVE identifier CVE-2024-32464.\n\nVersions Affected: >= 7.1.0\nNot affected: < 7.1.0\nFixed Versions: 7.1.3.4\n\nImpact\n------\n\nThis could lead to a potential cross site scripting issue within the Trix editor.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!\n","cvss_v2":null,"cvss_v3":6.1,"cve":"2024-32464","osvdb":null,"ghsa":"prjp-h48f-jgf6","unaffected_versions":["< 7.1.0"],"patched_versions":["~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}}]}
|
||||||
20
report.txt
20
report.txt
|
|
@ -1 +1,19 @@
|
||||||
No vulnerabilities found
|
Name: actionpack
|
||||||
|
Version: 7.1.4
|
||||||
|
CVE: CVE-2024-28103
|
||||||
|
GHSA: GHSA-fwhr-88qx-h9g7
|
||||||
|
Criticality: Medium
|
||||||
|
URL: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
|
||||||
|
Title: Missing security headers in Action Pack on non-HTML responses
|
||||||
|
Solution: upgrade to '~> 6.1.7.8', '~> 7.0.8.4', '~> 7.1.3.4', '>= 7.2.0.beta2'
|
||||||
|
|
||||||
|
Name: actiontext
|
||||||
|
Version: 7.1.4
|
||||||
|
CVE: CVE-2024-32464
|
||||||
|
GHSA: GHSA-prjp-h48f-jgf6
|
||||||
|
Criticality: Medium
|
||||||
|
URL: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
|
||||||
|
Title: ActionText ContentAttachment can Contain Unsanitized HTML
|
||||||
|
Solution: upgrade to '~> 7.1.3.4', '>= 7.2.0.beta2'
|
||||||
|
|
||||||
|
Vulnerabilities found!
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue