Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-28362

Опубликовано: 09 янв. 2025
Источник: debian
EPSS Низкий

Описание

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
railsfixed2:7.2.2.1+dfsg-1package

Примечания

  • https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132

  • https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5 (main)

  • https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441 (v6.1.7.4)

EPSS

Процентиль: 45%
0.00224
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
около 1 года назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

CVSS3: 4.7
redhat
больше 2 лет назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

CVSS3: 4
nvd
около 1 года назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

suse-cvrf
больше 2 лет назад

Security update for rubygem-actionpack-5_1

CVSS3: 4
github
больше 2 лет назад

Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to

EPSS

Процентиль: 45%
0.00224
Низкий