Skip to content

Commit 50b2f12

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@b1bb1f7
1 parent 5f1c0fb commit 50b2f12

File tree

2 files changed

+43
-18
lines changed

2 files changed

+43
-18
lines changed

advisories/_posts/2023-06-06-CVE-2023-34102.md

+32-14
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ advisory:
1414
description: |
1515
### Summary
1616
17-
"The polymorphic field type stores the classes to operate on when updating
17+
The polymorphic field type stores the classes to operate on when updating
1818
a record with user input, and does not validate them in the back end.
1919
This can lead to unexpected behavior, remote code execution, or
2020
application crashes when viewing a manipulated record.
@@ -35,20 +35,38 @@ advisory:
3535
3636
### PoC
3737
38-
![image](https://user-images.githubusercontent.com/26464774/243437854-933d94c8-4ae0-43fe-b2da-35b103e28796.png)\n_In the test scenario we choose the demo app and the review resource which has a polymorphic
39-
reviewable field._![image](https://user-images.githubusercontent.com/26464774/243437954-2d947c6d-4e97-4e91-a442-405e553dd047.png)\n_Intercepting
40-
the request and switching the review[reviewable_type] from “Fish”
41-
to “File” which is a real class inside Rails_![image](https://user-images.githubusercontent.com/26464774/243438031-109de6d0-9370-4318-b18e-c5bcea61cf54.png)\n_Corrupting
42-
the database with unusable classes will cause a crash at the
43-
application while viewing the new record or the index
44-
view (partial DoS)_\n\n![image](https://user-images.githubusercontent.com/26464774/243438104-80df5aae-86de-40fc-870d-689a03cae389.png)\n_Manual
45-
delete the corrupted resource in order to recover the applications functionality_\n\n![image](https://user-images.githubusercontent.com/26464774/243438182-1e7eef54-73ba-47d0-b5df-4bad14859af3.png)\n_Of
46-
course it is possible to use other class names or namespaces. The
38+
![image](https://user-images.githubusercontent.com/26464774/243437854-933d94c8-4ae0-43fe-b2da-35b103e28796.png)
39+
40+
In the test scenario we choose the demo app and the review
41+
resource which has a polymorphic reviewable field.
42+
43+
![image](https://user-images.githubusercontent.com/26464774/243437954-2d947c6d-4e97-4e91-a442-405e553dd047.png)
44+
45+
Intercepting the request and switching the review[reviewable_type]
46+
from “Fish” to “File” which is a real class inside Rails
47+
48+
![image](https://user-images.githubusercontent.com/26464774/243438031-109de6d0-9370-4318-b18e-c5bcea61cf54.png)
49+
50+
Corrupting the database with unusable classes will cause a crash
51+
at the application while viewing the new record or the index
52+
view (partial DoS)
53+
54+
![image](https://user-images.githubusercontent.com/26464774/243438104-80df5aae-86de-40fc-870d-689a03cae389.png)
55+
56+
Manual delete the corrupted resource in order to recover the
57+
applications functionality
58+
59+
![image](https://user-images.githubusercontent.com/26464774/243438182-1e7eef54-73ba-47d0-b5df-4bad14859af3.png)
60+
61+
Of course it is possible to use other class names or namespaces. The
4762
local development environment displays the backend error message
4863
when visiting a corrupted record. Avo is trying to apply a scope to
49-
this class that does not exist._\n\n![image](https://user-images.githubusercontent.com/26464774/243438257-dbb59153-58a8-4421-b796-f2a0f2c20083.png)\n_Specifying
50-
an invalid class name in the parameter will cause the application
51-
to crash again while trying constanize the provided string_
64+
this class that does not exist.
65+
66+
![image](https://user-images.githubusercontent.com/26464774/243438257-dbb59153-58a8-4421-b796-f2a0f2c20083.png)
67+
68+
Specifying an invalid class name in the parameter will cause the
69+
application to crash again while trying constanize the provided string
5270
5371
### Impact
5472
@@ -63,7 +81,7 @@ advisory:
6381
when defining classes for records. In this particular case, Avo can
6482
evaluate the options list given for the polymorphic field and only allow
6583
strings from that list. With this white-list approach, an attacker
66-
cannot supply unintended classes."
84+
cannot supply unintended classes.
6785
cvss_v3: 8.3
6886
patched_versions:
6987
- ">= 2.33.3"

advisories/_posts/2024-02-20-CVE-2023-47634.md

+11-4
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,17 @@ advisory:
1212
title: Race condition in Endorsements
1313
date: 2024-02-20
1414
description: |
15-
"### Impact\n\nA race condition in the endorsement of resources (for
16-
instance, a proposal) allows a user to make more than once endorsement.\n\nTo exploit
17-
this vulnerability, the request to set an endorsement must be sent several times
18-
in parallel.\n \n### Workarounds\n\nDisable the Endorsement feature in the components. "
15+
### Impact
16+
17+
A race condition in the endorsement of resources (for instance,
18+
a proposal) allows a user to make more than once endorsement.
19+
20+
To exploit this vulnerability, the request to set an
21+
endorsement must be sent several times in parallel.
22+
23+
### Workarounds
24+
25+
Disable the Endorsement feature in the components.
1926
cvss_v3: 3.1
2027
unaffected_versions:
2128
- "< 0.10.0"

0 commit comments

Comments
 (0)