diff --git a/bundle-audit-time.txt b/bundle-audit-time.txt index c71e9a1..d4ce213 100644 --- a/bundle-audit-time.txt +++ b/bundle-audit-time.txt @@ -1 +1 @@ -2024-10-17T09:08:44+02:00 +2024-10-17T09:11:37+02:00 diff --git a/bundle-audit.json b/bundle-audit.json index 2c67b0e..ba9514e 100644 --- a/bundle-audit.json +++ b/bundle-audit.json @@ -1 +1 @@ -{"version":"0.9.2","created_at":"2024-10-17 09:08:43 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionmailer","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionmailer/CVE-2024-47889.yml","id":"CVE-2024-47889","url":"https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6","title":"Possible ReDoS vulnerability in block_format in Action Mailer","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the block_format helper\nin Action Mailer. This vulnerability has been assigned the\nCVE identifier CVE-2024-47889.\n\n## Impact\n\nCarefully crafted text can cause the block_format helper to take an\nunexpected amount of time, possibly resulting in a DoS vulnerability.\nAll users running an affected release should either upgrade or apply\nthe relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires\nRuby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers can avoid calling the `block_format` helper or upgrade\nto Ruby 3.2.\n\n##Credits\n\nThanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47889","osvdb":null,"ghsa":"h47h-mwp9-c6q6","unaffected_versions":["< 3.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-41128.yml","id":"CVE-2024-41128","url":"https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj","title":"Possible ReDoS vulnerability in query parameter filtering in Action Dispatch","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the query parameter\nfiltering routines of Action Dispatch. This vulnerability has\nbeen assigned the CVE identifier CVE-2024-41128.\n\n## Impact\n\nCarefully crafted query parameters can cause query parameter\nfiltering to take an unexpected amount of time, possibly resulting\nin a DoS vulnerability. All users running an affected release\nshould either upgrade or apply the relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers on Ruby 3.2 are unaffected by this issue.\n\n## Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-41128","osvdb":null,"ghsa":"x76w-6vjr-8xgj","unaffected_versions":["< 3.1.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-47887.yml","id":"CVE-2024-47887","url":"https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4","title":"Possible ReDoS vulnerability in HTTP Token authentication in Action Controller","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in Action Controller's\nHTTP Token authentication. This vulnerability has been assigned\nthe CVE identifier CVE-2024-47887.\n\n## Impact\n\nFor applications using HTTP Token authentication via\n`authenticate_or_request_with_http_token` or similar, a carefully\ncrafted header may cause header parsing to take an unexpected amount\nof time, possibly resulting in a DoS vulnerability. All users running\nan affected release should either upgrade or apply the relevant\npatch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers on Ruby 3.2 are unaffected by this issue.\n\n## Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for reporting\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47887","osvdb":null,"ghsa":"vfg9-r3fq-jvx4","unaffected_versions":["< 4.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-47888.yml","id":"CVE-2024-47888","url":"https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw","title":"Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the\nplain_text_for_blockquote_node helper in Action Text. This\nvulnerability has been assigned the CVE identifier CVE-2024-47888.\n\n## Impact\n\nCarefully crafted text can cause the plain_text_for_blockquote_node\nhelper to take an unexpected amount of time, possibly resulting\nin a DoS vulnerability. All users running an affected release should\neither upgrade or apply the relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers can avoid calling `plain_text_for_blockquote_node` or\nupgrade to Ruby 3.2.\n\n## Credits\n\nThanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47888","osvdb":null,"ghsa":"wwhv-wxv9-rpgw","unaffected_versions":["< 6.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}}]} \ No newline at end of file +{"version":"0.9.2","created_at":"2024-10-17 09:11:37 +0200","results":[]} \ No newline at end of file diff --git a/report.txt b/report.txt index 0e9d86f..8900c02 100644 --- a/report.txt +++ b/report.txt @@ -1,37 +1 @@ -Name: actionmailer -Version: 7.1.3.4 -CVE: CVE-2024-47889 -GHSA: GHSA-h47h-mwp9-c6q6 -Criticality: Unknown -URL: https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6 -Title: Possible ReDoS vulnerability in block_format in Action Mailer -Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1' - -Name: actionpack -Version: 7.1.3.4 -CVE: CVE-2024-41128 -GHSA: GHSA-x76w-6vjr-8xgj -Criticality: Unknown -URL: https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj -Title: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch -Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1' - -Name: actionpack -Version: 7.1.3.4 -CVE: CVE-2024-47887 -GHSA: GHSA-vfg9-r3fq-jvx4 -Criticality: Unknown -URL: https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4 -Title: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller -Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1' - -Name: actiontext -Version: 7.1.3.4 -CVE: CVE-2024-47888 -GHSA: GHSA-wwhv-wxv9-rpgw -Criticality: Unknown -URL: https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw -Title: Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text -Solution: update to '~> 6.1.7.9', '~> 7.0.8.5', '~> 7.1.4.1', '>= 7.2.1.1' - -Vulnerabilities found! +No vulnerabilities found diff --git a/update-info.txt b/update-info.txt index 526e61d..1824931 100644 --- a/update-info.txt +++ b/update-info.txt @@ -1,15 +1,5 @@ Updating ruby-advisory-db ... -Updating a93d52d..443cfb9 -Fast-forward - gems/actionmailer/CVE-2024-47889.yml | 47 ++++++++++++++++++++++++++++++++++ - gems/actionpack/CVE-2024-41128.yml | 46 +++++++++++++++++++++++++++++++++ - gems/actionpack/CVE-2024-47887.yml | 49 ++++++++++++++++++++++++++++++++++++ - gems/actiontext/CVE-2024-47888.yml | 48 +++++++++++++++++++++++++++++++++++ - 4 files changed, 190 insertions(+) - create mode 100644 gems/actionmailer/CVE-2024-47889.yml - create mode 100644 gems/actionpack/CVE-2024-41128.yml - create mode 100644 gems/actionpack/CVE-2024-47887.yml - create mode 100644 gems/actiontext/CVE-2024-47888.yml +Already up to date. Updated ruby-advisory-db ruby-advisory-db: advisories: 942 advisories