Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 07fb427

Browse files
jasnowRubySec CI
authored andcommittedDec 11, 2024·
Updated advisory posts against rubysec/ruby-advisory-db@b88d29d
1 parent e86d6a6 commit 07fb427

File tree

1 file changed

+54
-0
lines changed

1 file changed

+54
-0
lines changed
 
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-54133 (actionpack): Possible Content Security Policy bypass in Action
4+
Dispatch'
5+
comments: false
6+
categories:
7+
- actionpack
8+
- rails
9+
advisory:
10+
gem: actionpack
11+
framework: rails
12+
cve: 2024-54133
13+
ghsa: vfm5-rmrh-j26v
14+
url: https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
15+
title: Possible Content Security Policy bypass in Action Dispatch
16+
date: 2024-12-10
17+
description: |
18+
There is a possible Cross Site Scripting (XSS) vulnerability
19+
in the `content_security_policy` helper in Action Pack.
20+
21+
## Impact
22+
23+
Applications which set Content-Security-Policy (CSP) headers
24+
dynamically from untrusted user input may be vulnerable to
25+
carefully crafted inputs being able to inject new directives
26+
into the CSP. This could lead to a bypass of the CSP and its
27+
protection against XSS and other attacks.
28+
29+
## Releases
30+
31+
The fixed releases are available at the normal locations.
32+
33+
## Workarounds
34+
35+
Applications can avoid setting CSP headers dynamically from
36+
untrusted input, or can validate/sanitize that input.
37+
38+
## Credits
39+
40+
Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
41+
cvss_v4: 2.3
42+
unaffected_versions:
43+
- "< 5.2.0"
44+
patched_versions:
45+
- "~> 7.0.8.7"
46+
- "~> 7.1.5.1"
47+
- "~> 7.2.2.1"
48+
- ">= 8.0.0.1"
49+
related:
50+
url:
51+
- https://nvd.nist.gov/vuln/detail/CVE-2024-54133
52+
- https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
53+
- https://github.com/advisories/GHSA-vfm5-rmrh-j26v
54+
---

0 commit comments

Comments
 (0)
Please sign in to comment.