From 94db2437f9f38ea29f6cf185c1593231e53e1658 Mon Sep 17 00:00:00 2001 From: ag Date: Thu, 6 Jun 2024 07:35:41 +0200 Subject: [PATCH] commit by to_remotes 2024-06-06 07:35:41 +0200 from vmdevac --- bundle-audit-time.txt | 2 +- bundle-audit.json | 2 +- report.txt | 20 +++++++++++++++++++- update-info.txt | 14 ++++++++++---- 4 files changed, 31 insertions(+), 7 deletions(-) diff --git a/bundle-audit-time.txt b/bundle-audit-time.txt index 5585da3..8dd06f6 100644 --- a/bundle-audit-time.txt +++ b/bundle-audit-time.txt @@ -1 +1 @@ -2024-06-05T10:09:08+02:00 +2024-06-06T07:35:40+02:00 diff --git a/bundle-audit.json b/bundle-audit.json index 2edd6be..8b751a3 100644 --- a/bundle-audit.json +++ b/bundle-audit.json @@ -1 +1 @@ -{"version":"0.9.1","created_at":"2024-06-05 10:09:07 +0200","results":[]} \ No newline at end of file +{"version":"0.9.1","created_at":"2024-06-06 07:35:39 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-28103.yml","id":"CVE-2024-28103","url":"https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7","title":"Missing security headers in Action Pack on non-HTML responses","date":"2024-06-04","description":"Permissions-Policy is Only Served on HTML Content-Type\n\nThe application configurable Permissions-Policy is only served\non responses with an HTML related Content-Type.\n\nThis has been assigned the CVE identifier CVE-2024-28103.\n\nVersions Affected: >= 6.1.0\nNot affected: < 6.1.0\nFixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4\n\nImpact\n------\n\nResponses with a non-HTML Content-Type are not serving the configured\nPermissions-Policy. There are certain non-HTML Content-Types that\nwould benefit from having the Permissions-Policy enforced.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\n\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series\n* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series\n* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!\n","cvss_v2":null,"cvss_v3":5.4,"cve":"2024-28103","osvdb":null,"ghsa":"fwhr-88qx-h9g7","unaffected_versions":["< 6.1.0"],"patched_versions":["~> 6.1.7.8","~> 7.0.8.4","~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-32464.yml","id":"CVE-2024-32464","url":"https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6","title":"ActionText ContentAttachment can Contain Unsanitized HTML","date":"2024-06-04","description":"Instances of ActionText::Attachable::ContentAttachment included\nwithin a rich_text_area tag could potentially contain unsanitized HTML.\n\nThis has been assigned the CVE identifier CVE-2024-32464.\n\nVersions Affected: >= 7.1.0\nNot affected: < 7.1.0\nFixed Versions: 7.1.3.4\n\nImpact\n------\n\nThis could lead to a potential cross site scripting issue within the Trix editor.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!\n","cvss_v2":null,"cvss_v3":6.1,"cve":"2024-32464","osvdb":null,"ghsa":"prjp-h48f-jgf6","unaffected_versions":["< 7.1.0"],"patched_versions":["~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}}]} \ No newline at end of file diff --git a/report.txt b/report.txt index 8900c02..fc47227 100644 --- a/report.txt +++ b/report.txt @@ -1 +1,19 @@ -No vulnerabilities found +Name: actionpack +Version: 7.1.3.3 +CVE: CVE-2024-28103 +GHSA: GHSA-fwhr-88qx-h9g7 +Criticality: Medium +URL: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7 +Title: Missing security headers in Action Pack on non-HTML responses +Solution: upgrade to '~> 6.1.7.8', '~> 7.0.8.4', '~> 7.1.3.4', '>= 7.2.0.beta2' + +Name: actiontext +Version: 7.1.3.3 +CVE: CVE-2024-32464 +GHSA: GHSA-prjp-h48f-jgf6 +Criticality: Medium +URL: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6 +Title: ActionText ContentAttachment can Contain Unsanitized HTML +Solution: upgrade to '~> 7.1.3.4', '>= 7.2.0.beta2' + +Vulnerabilities found! diff --git a/update-info.txt b/update-info.txt index e40cd6c..0997e02 100644 --- a/update-info.txt +++ b/update-info.txt @@ -1,7 +1,13 @@ Updating ruby-advisory-db ... -Already up to date. +Updating 3f8ac23..0049582 +Fast-forward + gems/actionpack/CVE-2024-28103.yml | 68 ++++++++++++++++++++++++++++++++++++++ + gems/actiontext/CVE-2024-32464.yml | 59 +++++++++++++++++++++++++++++++++ + 2 files changed, 127 insertions(+) + create mode 100644 gems/actionpack/CVE-2024-28103.yml + create mode 100644 gems/actiontext/CVE-2024-32464.yml Updated ruby-advisory-db ruby-advisory-db: - advisories: 893 advisories - last updated: 2024-06-03 06:37:35 -0700 - commit: 3f8ac23071db507f3ca3c57d1835dbf8c60265dd + advisories: 895 advisories + last updated: 2024-06-05 12:44:45 -0700 + commit: 0049582946f46532bcb5ea8b2b0e6322a2032886