{"version":"0.9.2","created_at":"2024-10-17 09:08:43 +0200","results":[{"type":"unpatched_gem","gem":{"name":"actionmailer","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionmailer/CVE-2024-47889.yml","id":"CVE-2024-47889","url":"https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6","title":"Possible ReDoS vulnerability in block_format in Action Mailer","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the block_format helper\nin Action Mailer. This vulnerability has been assigned the\nCVE identifier CVE-2024-47889.\n\n## Impact\n\nCarefully crafted text can cause the block_format helper to take an\nunexpected amount of time, possibly resulting in a DoS vulnerability.\nAll users running an affected release should either upgrade or apply\nthe relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires\nRuby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers can avoid calling the `block_format` helper or upgrade\nto Ruby 3.2.\n\n##Credits\n\nThanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47889","osvdb":null,"ghsa":"h47h-mwp9-c6q6","unaffected_versions":["< 3.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-41128.yml","id":"CVE-2024-41128","url":"https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj","title":"Possible ReDoS vulnerability in query parameter filtering in Action Dispatch","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the query parameter\nfiltering routines of Action Dispatch. This vulnerability has\nbeen assigned the CVE identifier CVE-2024-41128.\n\n## Impact\n\nCarefully crafted query parameters can cause query parameter\nfiltering to take an unexpected amount of time, possibly resulting\nin a DoS vulnerability. All users running an affected release\nshould either upgrade or apply the relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers on Ruby 3.2 are unaffected by this issue.\n\n## Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-41128","osvdb":null,"ghsa":"x76w-6vjr-8xgj","unaffected_versions":["< 3.1.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actionpack","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actionpack/CVE-2024-47887.yml","id":"CVE-2024-47887","url":"https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4","title":"Possible ReDoS vulnerability in HTTP Token authentication in Action Controller","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in Action Controller's\nHTTP Token authentication. This vulnerability has been assigned\nthe CVE identifier CVE-2024-47887.\n\n## Impact\n\nFor applications using HTTP Token authentication via\n`authenticate_or_request_with_http_token` or similar, a carefully\ncrafted header may cause header parsing to take an unexpected amount\nof time, possibly resulting in a DoS vulnerability. All users running\nan affected release should either upgrade or apply the relevant\npatch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers on Ruby 3.2 are unaffected by this issue.\n\n## Credits\n\nThanks to [scyoon](https://hackerone.com/scyoon) for reporting\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47887","osvdb":null,"ghsa":"vfg9-r3fq-jvx4","unaffected_versions":["< 4.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}},{"type":"unpatched_gem","gem":{"name":"actiontext","version":"7.1.3.4"},"advisory":{"path":"/home/wiseadvice/.local/share/ruby-advisory-db/gems/actiontext/CVE-2024-47888.yml","id":"CVE-2024-47888","url":"https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw","title":"Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text","date":"2024-10-15","description":"There is a possible ReDoS vulnerability in the\nplain_text_for_blockquote_node helper in Action Text. This\nvulnerability has been assigned the CVE identifier CVE-2024-47888.\n\n## Impact\n\nCarefully crafted text can cause the plain_text_for_blockquote_node\nhelper to take an unexpected amount of time, possibly resulting\nin a DoS vulnerability. All users running an affected release should\neither upgrade or apply the relevant patch immediately.\n\nRuby 3.2 has mitigations for this problem, so Rails applications\nusing Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends\non Ruby 3.2 or greater so is unaffected.\n\n## Releases\n\nThe fixed releases are available at the normal locations.\n\n## Workarounds\n\nUsers can avoid calling `plain_text_for_blockquote_node` or\nupgrade to Ruby 3.2.\n\n## Credits\n\nThanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!\n","cvss_v2":null,"cvss_v3":null,"cve":"2024-47888","osvdb":null,"ghsa":"wwhv-wxv9-rpgw","unaffected_versions":["< 6.0.0"],"patched_versions":["~> 6.1.7.9","~> 7.0.8.5","~> 7.1.4.1",">= 7.2.1.1"],"criticality":null}}]}