CVE-2023-28362
actionpack: Possible XSS via User Supplied Values to redirect_to
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.
Multiple security issues were discovered in the Rails web framework which could result cross-site scripting, information disclosure, denial of service or bypass of content security policies.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-03-15 CVE Reserved
- 2025-01-09 CVE Published
- 2025-01-09 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-116: Improper Encoding or Escaping of Output
CAPEC
References (6)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-28362 | 2023-12-14 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2217785 | 2023-12-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rails Search vendor "Rails" | Action Pack Search vendor "Rails" for product "Action Pack" | 7.0.5.1 Search vendor "Rails" for product "Action Pack" and version "7.0.5.1" | en |
Affected
| ||||||
Rails Search vendor "Rails" | Action Pack Search vendor "Rails" for product "Action Pack" | 6.1.7.4 Search vendor "Rails" for product "Action Pack" and version "6.1.7.4" | en |
Affected
|