// For flags

CVE-2024-54133

Possible Content Security Policy bypass in Action Dispatch

Severity Score

2.3
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
None
User Interaction
Passive
System
Vulnerable | Subsequent
Confidentiality
None
Low
Integrity
None
Low
Availability
None
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-11-29 CVE Reserved
  • 2024-12-10 CVE Published
  • 2024-12-11 CVE Updated
  • 2024-12-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Rails
Search vendor "Rails"
Rails
Search vendor "Rails" for product "Rails"
>= 5.2.0.0 < 7.0.8.7
Search vendor "Rails" for product "Rails" and version " >= 5.2.0.0 < 7.0.8.7"
en
Affected
Rails
Search vendor "Rails"
Rails
Search vendor "Rails" for product "Rails"
>= 7.1.0.0 < 7.1.5.1
Search vendor "Rails" for product "Rails" and version " >= 7.1.0.0 < 7.1.5.1"
en
Affected
Rails
Search vendor "Rails"
Rails
Search vendor "Rails" for product "Rails"
>= 7.2.0.0 < 7.2.2.1
Search vendor "Rails" for product "Rails" and version " >= 7.2.0.0 < 7.2.2.1"
en
Affected
Rails
Search vendor "Rails"
Rails
Search vendor "Rails" for product "Rails"
>= 8.0.0.0 < 8.0.0.1
Search vendor "Rails" for product "Rails" and version " >= 8.0.0.0 < 8.0.0.1"
en
Affected