Page 3 of 99 results (0.009 seconds)

CVSS: 7.4EPSS: 0%CPEs: 6EXPL: 0

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. • http://www.openwall.com/lists/oss-security/2022/02/11/5 https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html https://security.netapp.com/advisory/ntap-20240119-0013 https://www.debian.org/security/2023/dsa-5372 https://access.redhat.com/security/cve/CVE-2022-23633 https://bugzilla.redhat.com/show_bug.cgi?id=2063149 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 6.1EPSS: 0%CPEs: 3EXPL: 0

A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Se presenta una vulnerabilidad de redirección abierta en Action Pack versiones posteriores a 6.0.0 incluyéndola, que podría permitir a un atacante diseñar un encabezado "X-Forwarded-Host" en combinación con determinados formatos de "allowed host" puede causar que el middleware Host Authorization en Action Pack redirija a usuarios a un sitio web malicioso • https://github.com/rails/rails/commit/0fccfb9a3097a9c4260c791f1a40b128517e7815 https://security.netapp.com/advisory/ntap-20240208-0003 https://www.debian.org/security/2023/dsa-5372 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

A cross-site scripting vulnerability flaw was found in the auto_link function in Rails before version 3.0.6. Se ha encontrado un fallo de vulnerabilidad de tipo cross-site scripting en la función auto_link de Rails versiones anteriores a 3.0.6 • https://github.com/rails/rails/blob/38df020c95beca7e12f0188cb7e18f3c37789e20/actionpack/CHANGELOG https://www.openwall.com/lists/oss-security/2011/04/06/13 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website. Se presenta una posible vulnerabilidad de redireccionamiento abierto en el middleware Host Authorization de Action Pack versiones posteriores a 6.0.0 incluyéndola, que podría permitir a atacantes redirigir a usuarios a un sitio web malicioso • http://www.openwall.com/lists/oss-security/2021/12/14/5 https://security.netapp.com/advisory/ntap-20240202-0005 https://weblog.rubyonrails.org/2021/8/19/Rails-6-0-4-1-and-6-1-4-1-have-been-released https://www.debian.org/security/2023/dsa-5372 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

The actionpack ruby gem before 6.1.3.2 suffers from a possible open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. This is similar to CVE-2021-22881. Strings in config.hosts that do not have a leading dot are converted to regular expressions without proper escaping. This causes, for example, `config.hosts << "sub.example.com"` to permit a request with a Host header value of `sub-example.com`. • https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867 https://hackerone.com/reports/1148025 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •