Page 2 of 14 results (0.008 seconds)

CVSS: 7.4EPSS: 0%CPEs: 6EXPL: 0

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. • http://www.openwall.com/lists/oss-security/2022/02/11/5 https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html https://security.netapp.com/advisory/ntap-20240119-0013 https://www.debian.org/security/2023/dsa-5372 https://access.redhat.com/security/cve/CVE-2022-23633 https://bugzilla.redhat.com/show_bug.cgi?id=2063149 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Se presenta una vulnerabilidad de redirección abierta en Action Pack versiones posteriores a 6.0.0 incluyéndola, que podría permitir a un atacante diseñar un encabezado "X-Forwarded-Host" en combinación con determinados formatos de "allowed host" puede causar que el middleware Host Authorization en Action Pack redirija a usuarios a un sitio web malicioso • https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 https://security.netapp.com/advisory/ntap-20240208-0003 https://www.debian.org/security/2023/dsa-5372 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website. Se presenta una posible vulnerabilidad de redireccionamiento abierto en el middleware Host Authorization de Action Pack versiones posteriores a 6.0.0 incluyéndola, que podría permitir a atacantes redirigir a usuarios a un sitio web malicioso • http://www.openwall.com/lists/oss-security/2021/12/14/5 https://security.netapp.com/advisory/ntap-20240202-0005 https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released https://www.debian.org/security/2023/dsa-5372 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`. • https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867 https://hackerone.com/reports/1148025 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine. El actionpack ruby gem (un marco de trabajo para manejar y responder a peticiones web en Rails) versiones anteriores a 6.0.3.7, 6.1.3.2 sufre de una posible vulnerabilidad de denegación de servicio en el analizador de tipos Mime de Action Dispatch. Unas cabeceras Accept cuidadosamente diseñadas pueden hacer que el analizador de tipos mime de Action Dispatch realice un retroceso catastrófico en el motor de expresiones regulares A flaw was found in RubyGem Actionpack which is framework for handling and responding to web requests in Rails. A possible Denial of Service vulnerability was found in the Mime type parser of Action Dispatch. • https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866 https://hackerone.com/reports/1138654 https://access.redhat.com/security/cve/CVE-2021-22902 https://bugzilla.redhat.com/show_bug.cgi?id=1961382 • CWE-400: Uncontrolled Resource Consumption •