Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vfm5-rmrh-j26v

Опубликовано: 10 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 2.3

Описание

Possible Content Security Policy bypass in Action Dispatch

There is a possible Cross Site Scripting (XSS) vulnerability in the content_security_policy helper in Action Pack.

Impact

Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks.

Releases

The fixed releases are available at the normal locations.

Workarounds

Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

Credits

Thanks to ryotak for the report!

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 5.2.0, < 7.0.8.7

7.0.8.7

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 7.1.0, < 7.1.5.1

7.1.5.1

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 7.2.0, < 7.2.2.1

7.2.2.1

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 8.0.0, < 8.0.0.1

8.0.0.1

EPSS

Процентиль: 39%
0.00172
Низкий

2.3 Low

CVSS4

Дефекты

CWE-79

Связанные уязвимости

ubuntu
около 1 года назад

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

CVSS3: 4.3
redhat
около 1 года назад

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

nvd
около 1 года назад

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

debian
около 1 года назад

Action Pack is a framework for handling and responding to web requests ...

CVSS3: 4.3
redos
11 месяцев назад

Уязвимость rubygem-actionpack

EPSS

Процентиль: 39%
0.00172
Низкий

2.3 Low

CVSS4

Дефекты

CWE-79