File tree Expand file tree Collapse file tree 1 file changed +54
-0
lines changed Expand file tree Collapse file tree 1 file changed +54
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2024-54133 (actionpack): Possible Content Security Policy bypass in Action
4
+ Dispatch'
5
+ comments : false
6
+ categories :
7
+ - actionpack
8
+ - rails
9
+ advisory :
10
+ gem : actionpack
11
+ framework : rails
12
+ cve : 2024-54133
13
+ ghsa : vfm5-rmrh-j26v
14
+ url : https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
15
+ title : Possible Content Security Policy bypass in Action Dispatch
16
+ date : 2024-12-10
17
+ description : |
18
+ There is a possible Cross Site Scripting (XSS) vulnerability
19
+ in the `content_security_policy` helper in Action Pack.
20
+
21
+ ## Impact
22
+
23
+ Applications which set Content-Security-Policy (CSP) headers
24
+ dynamically from untrusted user input may be vulnerable to
25
+ carefully crafted inputs being able to inject new directives
26
+ into the CSP. This could lead to a bypass of the CSP and its
27
+ protection against XSS and other attacks.
28
+
29
+ ## Releases
30
+
31
+ The fixed releases are available at the normal locations.
32
+
33
+ ## Workarounds
34
+
35
+ Applications can avoid setting CSP headers dynamically from
36
+ untrusted input, or can validate/sanitize that input.
37
+
38
+ ## Credits
39
+
40
+ Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
41
+ cvss_v4 : 2.3
42
+ unaffected_versions :
43
+ - " < 5.2.0"
44
+ patched_versions :
45
+ - " ~> 7.0.8.7"
46
+ - " ~> 7.1.5.1"
47
+ - " ~> 7.2.2.1"
48
+ - " >= 8.0.0.1"
49
+ related :
50
+ url :
51
+ - https://nvd.nist.gov/vuln/detail/CVE-2024-54133
52
+ - https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
53
+ - https://github.com/advisories/GHSA-vfm5-rmrh-j26v
54
+ ---
You can’t perform that action at this time.
0 commit comments