Skip to content

Commit 5f1c0fb

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@0049582
1 parent 5555996 commit 5f1c0fb

File tree

2 files changed

+145
-0
lines changed

2 files changed

+145
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-28103 (actionpack): Missing security headers in Action Pack on non-HTML
4+
responses'
5+
comments: false
6+
categories:
7+
- actionpack
8+
- rails
9+
advisory:
10+
gem: actionpack
11+
framework: rails
12+
cve: 2024-28103
13+
ghsa: fwhr-88qx-h9g7
14+
url: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
15+
title: Missing security headers in Action Pack on non-HTML responses
16+
date: 2024-06-04
17+
description: |
18+
Permissions-Policy is Only Served on HTML Content-Type
19+
20+
The application configurable Permissions-Policy is only served
21+
on responses with an HTML related Content-Type.
22+
23+
This has been assigned the CVE identifier CVE-2024-28103.
24+
25+
Versions Affected: >= 6.1.0
26+
Not affected: < 6.1.0
27+
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4
28+
29+
Impact
30+
------
31+
32+
Responses with a non-HTML Content-Type are not serving the configured
33+
Permissions-Policy. There are certain non-HTML Content-Types that
34+
would benefit from having the Permissions-Policy enforced.
35+
36+
Releases
37+
--------
38+
39+
The fixed releases are available at the normal locations.
40+
41+
Workarounds
42+
-----------
43+
44+
N/A
45+
46+
Patches
47+
-------
48+
49+
To aid users who aren't able to upgrade immediately we have provided
50+
patches for the supported release series in accordance with our
51+
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
52+
regarding security issues. They are in git-am format and consist
53+
of a single changeset.
54+
55+
* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series
56+
* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series
57+
* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series
58+
59+
Credits
60+
-------
61+
62+
Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!
63+
cvss_v3: 5.4
64+
unaffected_versions:
65+
- "< 6.1.0"
66+
patched_versions:
67+
- "~> 6.1.7.8"
68+
- "~> 7.0.8.4"
69+
- "~> 7.1.3.4"
70+
- ">= 7.2.0.beta2"
71+
related:
72+
url:
73+
- https://nvd.nist.gov/vuln/detail/CVE-2024-28103
74+
- https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
75+
- https://github.com/rails/rails/commit/35858f1d9d57f6c4050a8d9ab754bd5d088b4523
76+
- https://github.com/advisories/GHSA-fwhr-88qx-h9g7
77+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-32464 (actiontext): ActionText ContentAttachment can Contain Unsanitized
4+
HTML'
5+
comments: false
6+
categories:
7+
- actiontext
8+
- rails
9+
advisory:
10+
gem: actiontext
11+
framework: rails
12+
cve: 2024-32464
13+
ghsa: prjp-h48f-jgf6
14+
url: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
15+
title: ActionText ContentAttachment can Contain Unsanitized HTML
16+
date: 2024-06-04
17+
description: |
18+
Instances of ActionText::Attachable::ContentAttachment included
19+
within a rich_text_area tag could potentially contain unsanitized HTML.
20+
21+
This has been assigned the CVE identifier CVE-2024-32464.
22+
23+
Versions Affected: >= 7.1.0
24+
Not affected: < 7.1.0
25+
Fixed Versions: 7.1.3.4
26+
27+
Impact
28+
------
29+
30+
This could lead to a potential cross site scripting issue within the Trix editor.
31+
32+
Releases
33+
--------
34+
35+
The fixed releases are available at the normal locations.
36+
37+
Workarounds
38+
-----------
39+
40+
N/A
41+
42+
Patches
43+
-------
44+
To aid users who aren't able to upgrade immediately we have provided
45+
patches for the supported release series in accordance with our
46+
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
47+
regarding security issues. They are in git-am format and consist
48+
of a single changeset.
49+
50+
* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series
51+
52+
Credits
53+
-------
54+
55+
Thank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!
56+
cvss_v3: 6.1
57+
unaffected_versions:
58+
- "< 7.1.0"
59+
patched_versions:
60+
- "~> 7.1.3.4"
61+
- ">= 7.2.0.beta2"
62+
related:
63+
url:
64+
- https://nvd.nist.gov/vuln/detail/CVE-2024-32464
65+
- https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
66+
- https://github.com/rails/rails/commit/e215bf3360e6dfe1497c1503a495e384ed6b0995
67+
- https://github.com/advisories/GHSA-prjp-h48f-jgf6
68+
---

0 commit comments

Comments
 (0)