From 76a8a8b07ba24b8894436d1f72f07a56f13a30a3 Mon Sep 17 00:00:00 2001 From: ag Date: Thu, 6 Jun 2024 07:39:50 +0200 Subject: [PATCH] commit by to_remotes 2024-06-06 07:39:50 +0200 from vmdevac --- bundle-audit-time.txt | 2 +- bundle-audit.json | 2 +- report.txt | 20 +------------------- update-info.txt | 8 +------- 4 files changed, 4 insertions(+), 28 deletions(-) diff --git a/bundle-audit-time.txt b/bundle-audit-time.txt index 8dd06f6..d8accce 100644 --- a/bundle-audit-time.txt +++ b/bundle-audit-time.txt @@ -1 +1 @@ -2024-06-06T07:35:40+02:00 +2024-06-06T07:39:48+02:00 diff --git a/bundle-audit.json b/bundle-audit.json index 8b751a3..4584ed0 100644 --- a/bundle-audit.json +++ b/bundle-audit.json @@ -1 +1 @@ -{"version":"0.9.1","created_at":"2024-06-06 07:35:39 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-28103.yml","id":"CVE-2024-28103","url":"https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7","title":"Missing security headers in Action Pack on non-HTML responses","date":"2024-06-04","description":"Permissions-Policy is Only Served on HTML Content-Type\n\nThe application configurable Permissions-Policy is only served\non responses with an HTML related Content-Type.\n\nThis has been assigned the CVE identifier CVE-2024-28103.\n\nVersions Affected: >= 6.1.0\nNot affected: < 6.1.0\nFixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4\n\nImpact\n------\n\nResponses with a non-HTML Content-Type are not serving the configured\nPermissions-Policy. There are certain non-HTML Content-Types that\nwould benefit from having the Permissions-Policy enforced.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\n\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series\n* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series\n* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!\n","cvss_v2":null,"cvss_v3":5.4,"cve":"2024-28103","osvdb":null,"ghsa":"fwhr-88qx-h9g7","unaffected_versions":["< 6.1.0"],"patched_versions":["~> 6.1.7.8","~> 7.0.8.4","~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-32464.yml","id":"CVE-2024-32464","url":"https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6","title":"ActionText ContentAttachment can Contain Unsanitized HTML","date":"2024-06-04","description":"Instances of ActionText::Attachable::ContentAttachment included\nwithin a rich_text_area tag could potentially contain unsanitized HTML.\n\nThis has been assigned the CVE identifier CVE-2024-32464.\n\nVersions Affected: >= 7.1.0\nNot affected: < 7.1.0\nFixed Versions: 7.1.3.4\n\nImpact\n------\n\nThis could lead to a potential cross site scripting issue within the Trix editor.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!\n","cvss_v2":null,"cvss_v3":6.1,"cve":"2024-32464","osvdb":null,"ghsa":"prjp-h48f-jgf6","unaffected_versions":["< 7.1.0"],"patched_versions":["~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}}]} \ No newline at end of file +{"version":"0.9.1","created_at":"2024-06-06 07:39:48 +0200","results":[]} \ No newline at end of file diff --git a/report.txt b/report.txt index fc47227..8900c02 100644 --- a/report.txt +++ b/report.txt @@ -1,19 +1 @@ -Name: actionpack -Version: 7.1.3.3 -CVE: CVE-2024-28103 -GHSA: GHSA-fwhr-88qx-h9g7 -Criticality: Medium -URL: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7 -Title: Missing security headers in Action Pack on non-HTML responses -Solution: upgrade to '~> 6.1.7.8', '~> 7.0.8.4', '~> 7.1.3.4', '>= 7.2.0.beta2' - -Name: actiontext -Version: 7.1.3.3 -CVE: CVE-2024-32464 -GHSA: GHSA-prjp-h48f-jgf6 -Criticality: Medium -URL: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6 -Title: ActionText ContentAttachment can Contain Unsanitized HTML -Solution: upgrade to '~> 7.1.3.4', '>= 7.2.0.beta2' - -Vulnerabilities found! +No vulnerabilities found diff --git a/update-info.txt b/update-info.txt index 0997e02..f95910a 100644 --- a/update-info.txt +++ b/update-info.txt @@ -1,11 +1,5 @@ Updating ruby-advisory-db ... -Updating 3f8ac23..0049582 -Fast-forward - gems/actionpack/CVE-2024-28103.yml | 68 ++++++++++++++++++++++++++++++++++++++ - gems/actiontext/CVE-2024-32464.yml | 59 +++++++++++++++++++++++++++++++++ - 2 files changed, 127 insertions(+) - create mode 100644 gems/actionpack/CVE-2024-28103.yml - create mode 100644 gems/actiontext/CVE-2024-32464.yml +Already up to date. Updated ruby-advisory-db ruby-advisory-db: advisories: 895 advisories