Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4g8v-vg43-wpgf

Опубликовано: 29 июн. 2023
Источник: github
Github: Прошло ревью
CVSS3: 4

Описание

Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362.

Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4

Impact

This introduces the potential for a Cross-site-scripting (XSS) payload to be delivered on the now static redirection page. Note that this both requires user interaction and for a Rails app to be configured to allow redirects to external hosts (defaults to false in Rails >= 7.0.x).

Releases

The FIXED releases are available at the normal locations.

Workarounds

Avoid providing user supplied URLs with arbitrary schemes to the redirect_to method.

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

< 6.1.7.4

6.1.7.4

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.5.1

7.0.5.1

EPSS

Процентиль: 45%
0.00224
Низкий

4 Medium

CVSS3

Дефекты

CWE-116

Связанные уязвимости

CVSS3: 4
ubuntu
около 1 года назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

CVSS3: 4.7
redhat
больше 2 лет назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

CVSS3: 4
nvd
около 1 года назад

The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.

CVSS3: 4
debian
около 1 года назад

The redirect_to method in Rails allows provided values to contain char ...

suse-cvrf
больше 2 лет назад

Security update for rubygem-actionpack-5_1

EPSS

Процентиль: 45%
0.00224
Низкий

4 Medium

CVSS3

Дефекты

CWE-116