Skip to content

Commit 3f8ac23

Browse files
chadlwilsonpostmodern
authored andcommitted
Correct affected versions for CVE-2024-34341
As documented officially at https://discuss.rubyonrails.org/t/xss-vulnerabilities-in-trix-editor/85803 Signed-off-by: Chad Wilson <chadw@thoughtworks.com>
1 parent ee0172a commit 3f8ac23

1 file changed

Lines changed: 3 additions & 2 deletions

File tree

gems/actiontext/CVE-2024-34341.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ url: https://github.com/advisories/GHSA-qjqp-xr96-cj99
66
title: Arbitrary Code Execution Vulnerability in Trix Editor included in ActionText
77
date: 2024-05-07
88
description: |
9-
The ActionText gem includes a copy of the Trix rich text editor.
9+
From version 7.0 onwards the ActionText gem includes a copy of the Trix rich text editor.
1010
Prior to versions 7.0.8.3 and 7.1.3.3, ActionText included a version of Trix that
1111
is vulnerable to arbitrary code execution when
1212
copying and pasting content from the web or other documents with markup into the editor.
@@ -16,7 +16,6 @@ description: |
1616
# Vulnerable Versions:
1717
* 7.1 series older than 7.1.3.3
1818
* 7.0 series older than 7.0.8.3
19-
* All versions of ActionText older than 7.0
2019
2120
# Fixed Versions:
2221
* 7.1.3.3
@@ -55,6 +54,8 @@ description: |
5554
can significantly mitigate the risk of such vulnerabilities.
5655
Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin
5756
are executed, and explicitly prohibit inline scripts using script-src-elem.
57+
unaffected_versions:
58+
- "< 7.0.0"
5859
patched_versions:
5960
- "~> 7.0.8.3"
6061
- ">= 7.1.3.3"

0 commit comments

Comments
 (0)