Skip to content

Commit 932ac3c

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@a8a8f82
1 parent 50b2f12 commit 932ac3c

4 files changed

+0
-71
lines changed

advisories/_posts/2023-06-06-CVE-2023-34102.md

-35
Original file line numberDiff line numberDiff line change
@@ -33,41 +33,6 @@ advisory:
3333
and attempts to work with it, which may result in dangerous behavior
3434
and code execution.
3535
36-
### PoC
37-
38-
![image](https://user-images.githubusercontent.com/26464774/243437854-933d94c8-4ae0-43fe-b2da-35b103e28796.png)
39-
40-
In the test scenario we choose the demo app and the review
41-
resource which has a polymorphic reviewable field.
42-
43-
![image](https://user-images.githubusercontent.com/26464774/243437954-2d947c6d-4e97-4e91-a442-405e553dd047.png)
44-
45-
Intercepting the request and switching the review[reviewable_type]
46-
from “Fish” to “File” which is a real class inside Rails
47-
48-
![image](https://user-images.githubusercontent.com/26464774/243438031-109de6d0-9370-4318-b18e-c5bcea61cf54.png)
49-
50-
Corrupting the database with unusable classes will cause a crash
51-
at the application while viewing the new record or the index
52-
view (partial DoS)
53-
54-
![image](https://user-images.githubusercontent.com/26464774/243438104-80df5aae-86de-40fc-870d-689a03cae389.png)
55-
56-
Manual delete the corrupted resource in order to recover the
57-
applications functionality
58-
59-
![image](https://user-images.githubusercontent.com/26464774/243438182-1e7eef54-73ba-47d0-b5df-4bad14859af3.png)
60-
61-
Of course it is possible to use other class names or namespaces. The
62-
local development environment displays the backend error message
63-
when visiting a corrupted record. Avo is trying to apply a scope to
64-
this class that does not exist.
65-
66-
![image](https://user-images.githubusercontent.com/26464774/243438257-dbb59153-58a8-4421-b796-f2a0f2c20083.png)
67-
68-
Specifying an invalid class name in the parameter will cause the
69-
application to crash again while trying constanize the provided string
70-
7136
### Impact
7237
7338
The final exploitation of this vulnerability requires more time than

advisories/_posts/2023-06-06-CVE-2023-34103.md

-7
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,6 @@ advisory:
2929
the request and modifying the post data, as the trix editor does not
3030
allow adding custom html or js tags on the frontend.
3131
32-
### PoC
33-
34-
![image](https://user-images.githubusercontent.com/26464774/243434868-47857054-9b20-437f-842f-0750d53c9b0e.png)
35-
_Adding javascript in the post request which is used when editing a "post" resource (body is declared as a trix field)_
36-
![image](https://user-images.githubusercontent.com/26464774/243435009-948593a0-5179-4368-977c-ec36d2373925.png)
37-
_Successful execution of JS code on live demo environment_
38-
3932
### Impact
4033
4134
Unlike non-persistent XSS, persistent XSS does not require a social

advisories/_posts/2024-01-16-CVE-2024-22191.md

-20
Original file line numberDiff line numberDiff line change
@@ -34,26 +34,6 @@ advisory:
3434
the value is taken in lines **38** and **49** and seems to be
3535
interpreted directly as html in lines **44** and **55**.
3636
37-
### PoC
38-
39-
![POC](https://user-images.githubusercontent.com/26570201/295596307-5d4f563e-99c0-4981-a82e-fc42cfd902c5.gif)
40-
41-
To reproduce the vulnerability, follow these steps:
42-
43-
1. Edit an entry with a key_value field.
44-
45-
2. Enter the following payload into the value field:
46-
```POC\\\"> <script>alert('XSS in key_value' );</script> <strong>Outside-tag</strong```
47-
48-
3. Save the entry.
49-
50-
4. Go to the index page and click on the eye icon next to the entry.
51-
52-
The malicious JavaScript code will be executed and an alert box will be displayed.
53-
54-
_On the show and edit page the alert seems not to pop up, but the
55-
strong tag breaks out of the expected html tag_
56-
5737
### Impact
5838
5939
This vulnerability could be used to steal sensitive information from

advisories/_posts/2024-02-28-CVE-2024-27285.md

-9
Original file line numberDiff line numberDiff line change
@@ -51,15 +51,6 @@ advisory:
5151
</script>
5252
```
5353
54-
### PoC (Proof of Concept)
55-
56-
To exploit this vulnerability:
57-
1. Gain access to the generated Yard Doc.
58-
2. Locate and access the "frames.html" file.
59-
3. Construct a URL containing the malicious payload in the hash
60-
segment, for instance: `#!javascript:xss` for v0.9.34, and
61-
`#:javascript:xss` for v0.9.35
62-
6354
### Impact
6455
6556
This XSS vulnerability presents a substantial threat by enabling

0 commit comments

Comments
 (0)