3
0
Fork 0

commit by to_remotes 2024-06-06 07:35:41 +0200 from vmdevac

main
ag 2024-06-06 07:35:41 +02:00
parent 1623f5b1f5
commit 94db2437f9
4 changed files with 31 additions and 7 deletions

View File

@ -1 +1 @@
2024-06-05T10:09:08+02:00 2024-06-06T07:35:40+02:00

View File

@ -1 +1 @@
{"version":"0.9.1","created_at":"2024-06-05 10:09:07 +0200","results":[]} {"version":"0.9.1","created_at":"2024-06-06 07:35:39 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-28103.yml","id":"CVE-2024-28103","url":"https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7","title":"Missing security headers in Action Pack on non-HTML responses","date":"2024-06-04","description":"Permissions-Policy is Only Served on HTML Content-Type\n\nThe application configurable Permissions-Policy is only served\non responses with an HTML related Content-Type.\n\nThis has been assigned the CVE identifier CVE-2024-28103.\n\nVersions Affected: >= 6.1.0\nNot affected: < 6.1.0\nFixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4\n\nImpact\n------\n\nResponses with a non-HTML Content-Type are not serving the configured\nPermissions-Policy. There are certain non-HTML Content-Types that\nwould benefit from having the Permissions-Policy enforced.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\n\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series\n* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series\n* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!\n","cvss_v2":null,"cvss_v3":5.4,"cve":"2024-28103","osvdb":null,"ghsa":"fwhr-88qx-h9g7","unaffected_versions":["< 6.1.0"],"patched_versions":["~> 6.1.7.8","~> 7.0.8.4","~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.3.3"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-32464.yml","id":"CVE-2024-32464","url":"https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6","title":"ActionText ContentAttachment can Contain Unsanitized HTML","date":"2024-06-04","description":"Instances of ActionText::Attachable::ContentAttachment included\nwithin a rich_text_area tag could potentially contain unsanitized HTML.\n\nThis has been assigned the CVE identifier CVE-2024-32464.\n\nVersions Affected: >= 7.1.0\nNot affected: < 7.1.0\nFixed Versions: 7.1.3.4\n\nImpact\n------\n\nThis could lead to a potential cross site scripting issue within the Trix editor.\n\nReleases\n--------\n\nThe fixed releases are available at the normal locations.\n\nWorkarounds\n-----------\n\nN/A\n\nPatches\n-------\nTo aid users who aren't able to upgrade immediately we have provided\npatches for the supported release series in accordance with our\n[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)\nregarding security issues. They are in git-am format and consist\nof a single changeset.\n\n* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series\n\nCredits\n-------\n\nThank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!\n","cvss_v2":null,"cvss_v3":6.1,"cve":"2024-32464","osvdb":null,"ghsa":"prjp-h48f-jgf6","unaffected_versions":["< 7.1.0"],"patched_versions":["~> 7.1.3.4",">= 7.2.0.beta2"],"criticality":"medium"}}]}

View File

@ -1 +1,19 @@
No vulnerabilities found Name: actionpack
Version: 7.1.3.3
CVE: CVE-2024-28103
GHSA: GHSA-fwhr-88qx-h9g7
Criticality: Medium
URL: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
Title: Missing security headers in Action Pack on non-HTML responses
Solution: upgrade to '~> 6.1.7.8', '~> 7.0.8.4', '~> 7.1.3.4', '>= 7.2.0.beta2'
Name: actiontext
Version: 7.1.3.3
CVE: CVE-2024-32464
GHSA: GHSA-prjp-h48f-jgf6
Criticality: Medium
URL: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
Title: ActionText ContentAttachment can Contain Unsanitized HTML
Solution: upgrade to '~> 7.1.3.4', '>= 7.2.0.beta2'
Vulnerabilities found!

View File

@ -1,7 +1,13 @@
Updating ruby-advisory-db ... Updating ruby-advisory-db ...
Already up to date. Updating 3f8ac23..0049582
Fast-forward
gems/actionpack/CVE-2024-28103.yml | 68 ++++++++++++++++++++++++++++++++++++++
gems/actiontext/CVE-2024-32464.yml | 59 +++++++++++++++++++++++++++++++++
2 files changed, 127 insertions(+)
create mode 100644 gems/actionpack/CVE-2024-28103.yml
create mode 100644 gems/actiontext/CVE-2024-32464.yml
Updated ruby-advisory-db Updated ruby-advisory-db
ruby-advisory-db: ruby-advisory-db:
advisories: 893 advisories advisories: 895 advisories
last updated: 2024-06-03 06:37:35 -0700 last updated: 2024-06-05 12:44:45 -0700
commit: 3f8ac23071db507f3ca3c57d1835dbf8c60265dd commit: 0049582946f46532bcb5ea8b2b0e6322a2032886