Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-54133

Опубликовано: 10 дек. 2024
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the content_security_policy helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

A cross site scripting (XSS) vulnerability was found in the content_security_policy helper in certain versions of Action Pack. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs injecting new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks.

Меры по смягчению последствий

Applications can avoid setting CSP headers dynamically from untrusted input or can validate/sanitize that input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-system-containerFix deferred
Red Hat 3scale API Management Platform 23scale-amp-zync-containerFix deferred
Red Hat Satellite 6rubygem-actionpackFix deferred
Red Hat Satellite 6satellite:el8/rubygem-actionpackFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=2331619actionpack: Possible Content Security Policy bypass in Action Dispatch

EPSS

Процентиль: 39%
0.00172
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

ubuntu
около 1 года назад

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

nvd
около 1 года назад

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

debian
около 1 года назад

Action Pack is a framework for handling and responding to web requests ...

CVSS3: 4.3
redos
11 месяцев назад

Уязвимость rubygem-actionpack

github
около 1 года назад

Possible Content Security Policy bypass in Action Dispatch

EPSS

Процентиль: 39%
0.00172
Низкий

4.3 Medium

CVSS3

Уязвимость CVE-2024-54133