Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8727-m6gj-mc37

Опубликовано: 26 мая 2020
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Possible Strong Parameters Bypass in ActionPack

There is a strong parameters bypass vector in ActionPack.

Versions Affected: rails <= 6.0.3 Not affected: rails < 5.0.0 Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1

Impact

In some cases user supplied information can be inadvertently leaked from Strong Parameters. Specifically the return value of each, or each_value, or each_pair will return the underlying "untrusted" hash of data that was read from the parameters. Applications that use this return value may be inadvertently use untrusted user input.

Impacted code will look something like this:

def update # Attacker has included the parameter: `{ is_admin: true }` User.update(clean_up_params) end def clean_up_params params.each { |k, v| SomeModel.check(v) if k == :name } end

Note the mistaken use of each in the clean_up_params method in the above example.

Workarounds

Do not use the return values of each, each_value, or each_pair in your application.

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 5.0.0, <= 5.2.4.2

5.2.4.3

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.3

6.0.3.1

EPSS

Процентиль: 90%
0.05862
Низкий

7.5 High

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 5 лет назад

A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.

CVSS3: 7.5
redhat
около 5 лет назад

A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.

CVSS3: 7.5
nvd
около 5 лет назад

A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.

CVSS3: 7.5
debian
около 5 лет назад

A deserialization of untrusted data vulnerability exists in rails < 5. ...

suse-cvrf
почти 5 лет назад

Security update for rubygem-actionpack-5_1

EPSS

Процентиль: 90%
0.05862
Низкий

7.5 High

CVSS3

Дефекты

CWE-502