Skip to content

Commit 0049582

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 2 brand new advisories
1 parent 3f8ac23 commit 0049582

2 files changed

Lines changed: 127 additions & 0 deletions

File tree

gems/actionpack/CVE-2024-28103.yml

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
---
2+
gem: actionpack
3+
framework: rails
4+
cve: 2024-28103
5+
ghsa: fwhr-88qx-h9g7
6+
url: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
7+
title: Missing security headers in Action Pack on non-HTML responses
8+
date: 2024-06-04
9+
description: |
10+
Permissions-Policy is Only Served on HTML Content-Type
11+
12+
The application configurable Permissions-Policy is only served
13+
on responses with an HTML related Content-Type.
14+
15+
This has been assigned the CVE identifier CVE-2024-28103.
16+
17+
Versions Affected: >= 6.1.0
18+
Not affected: < 6.1.0
19+
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4
20+
21+
Impact
22+
------
23+
24+
Responses with a non-HTML Content-Type are not serving the configured
25+
Permissions-Policy. There are certain non-HTML Content-Types that
26+
would benefit from having the Permissions-Policy enforced.
27+
28+
Releases
29+
--------
30+
31+
The fixed releases are available at the normal locations.
32+
33+
Workarounds
34+
-----------
35+
36+
N/A
37+
38+
Patches
39+
-------
40+
41+
To aid users who aren't able to upgrade immediately we have provided
42+
patches for the supported release series in accordance with our
43+
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
44+
regarding security issues. They are in git-am format and consist
45+
of a single changeset.
46+
47+
* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series
48+
* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series
49+
* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series
50+
51+
Credits
52+
-------
53+
54+
Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this!
55+
cvss_v3: 5.4
56+
unaffected_versions:
57+
- "< 6.1.0"
58+
patched_versions:
59+
- "~> 6.1.7.8"
60+
- "~> 7.0.8.4"
61+
- "~> 7.1.3.4"
62+
- ">= 7.2.0.beta2"
63+
related:
64+
url:
65+
- https://nvd.nist.gov/vuln/detail/CVE-2024-28103
66+
- https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7
67+
- https://github.com/rails/rails/commit/35858f1d9d57f6c4050a8d9ab754bd5d088b4523
68+
- https://github.com/advisories/GHSA-fwhr-88qx-h9g7

gems/actiontext/CVE-2024-32464.yml

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
gem: actiontext
3+
framework: rails
4+
cve: 2024-32464
5+
ghsa: prjp-h48f-jgf6
6+
url: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
7+
title: ActionText ContentAttachment can Contain Unsanitized HTML
8+
date: 2024-06-04
9+
description: |
10+
Instances of ActionText::Attachable::ContentAttachment included
11+
within a rich_text_area tag could potentially contain unsanitized HTML.
12+
13+
This has been assigned the CVE identifier CVE-2024-32464.
14+
15+
Versions Affected: >= 7.1.0
16+
Not affected: < 7.1.0
17+
Fixed Versions: 7.1.3.4
18+
19+
Impact
20+
------
21+
22+
This could lead to a potential cross site scripting issue within the Trix editor.
23+
24+
Releases
25+
--------
26+
27+
The fixed releases are available at the normal locations.
28+
29+
Workarounds
30+
-----------
31+
32+
N/A
33+
34+
Patches
35+
-------
36+
To aid users who aren't able to upgrade immediately we have provided
37+
patches for the supported release series in accordance with our
38+
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
39+
regarding security issues. They are in git-am format and consist
40+
of a single changeset.
41+
42+
* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series
43+
44+
Credits
45+
-------
46+
47+
Thank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this!
48+
cvss_v3: 6.1
49+
unaffected_versions:
50+
- "< 7.1.0"
51+
patched_versions:
52+
- "~> 7.1.3.4"
53+
- ">= 7.2.0.beta2"
54+
related:
55+
url:
56+
- https://nvd.nist.gov/vuln/detail/CVE-2024-32464
57+
- https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
58+
- https://github.com/rails/rails/commit/e215bf3360e6dfe1497c1503a495e384ed6b0995
59+
- https://github.com/advisories/GHSA-prjp-h48f-jgf6

0 commit comments

Comments
 (0)