Page 2 of 12 results (0.002 seconds)

CVSS: 7.4EPSS: 0%CPEs: 6EXPL: 0

11 Feb 2022 — Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p... • http://www.openwall.com/lists/oss-security/2022/02/11/5 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 6.1EPSS: 39%CPEs: 3EXPL: 0

07 Jan 2022 — A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Se presenta una vulnerabilidad de redirección abierta en Action Pack versiones posteriores a 6.0.0 incluyéndola, que podría permitir a un atacante diseñar un encabezado "X-Forwarded-Host" en combinación con determinados formatos de ... • https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •