-
-
Notifications
You must be signed in to change notification settings - Fork 221
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
127 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
--- | ||
gem: actionpack | ||
framework: rails | ||
cve: 2024-28103 | ||
ghsa: fwhr-88qx-h9g7 | ||
url: https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7 | ||
title: Missing security headers in Action Pack on non-HTML responses | ||
date: 2024-06-04 | ||
description: | | ||
Permissions-Policy is Only Served on HTML Content-Type | ||
The application configurable Permissions-Policy is only served | ||
on responses with an HTML related Content-Type. | ||
This has been assigned the CVE identifier CVE-2024-28103. | ||
Versions Affected: >= 6.1.0 | ||
Not affected: < 6.1.0 | ||
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4 | ||
Impact | ||
------ | ||
Responses with a non-HTML Content-Type are not serving the configured | ||
Permissions-Policy. There are certain non-HTML Content-Types that | ||
would benefit from having the Permissions-Policy enforced. | ||
Releases | ||
-------- | ||
The fixed releases are available at the normal locations. | ||
Workarounds | ||
----------- | ||
N/A | ||
Patches | ||
------- | ||
To aid users who aren't able to upgrade immediately we have provided | ||
patches for the supported release series in accordance with our | ||
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues) | ||
regarding security issues. They are in git-am format and consist | ||
of a single changeset. | ||
* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series | ||
* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series | ||
* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series | ||
Credits | ||
------- | ||
Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this! | ||
cvss_v3: 5.4 | ||
unaffected_versions: | ||
- "< 6.1.0" | ||
patched_versions: | ||
- "~> 6.1.7.8" | ||
- "~> 7.0.8.4" | ||
- "~> 7.1.3.4" | ||
- ">= 7.2.0.beta2" | ||
related: | ||
url: | ||
- https://nvd.nist.gov/vuln/detail/CVE-2024-28103 | ||
- https://github.com/rails/rails/security/advisories/GHSA-fwhr-88qx-h9g7 | ||
- https://github.com/rails/rails/commit/35858f1d9d57f6c4050a8d9ab754bd5d088b4523 | ||
- https://github.com/advisories/GHSA-fwhr-88qx-h9g7 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
--- | ||
gem: actiontext | ||
framework: rails | ||
cve: 2024-32464 | ||
ghsa: prjp-h48f-jgf6 | ||
url: https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6 | ||
title: ActionText ContentAttachment can Contain Unsanitized HTML | ||
date: 2024-06-04 | ||
description: | | ||
Instances of ActionText::Attachable::ContentAttachment included | ||
within a rich_text_area tag could potentially contain unsanitized HTML. | ||
This has been assigned the CVE identifier CVE-2024-32464. | ||
Versions Affected: >= 7.1.0 | ||
Not affected: < 7.1.0 | ||
Fixed Versions: 7.1.3.4 | ||
Impact | ||
------ | ||
This could lead to a potential cross site scripting issue within the Trix editor. | ||
Releases | ||
-------- | ||
The fixed releases are available at the normal locations. | ||
Workarounds | ||
----------- | ||
N/A | ||
Patches | ||
------- | ||
To aid users who aren't able to upgrade immediately we have provided | ||
patches for the supported release series in accordance with our | ||
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues) | ||
regarding security issues. They are in git-am format and consist | ||
of a single changeset. | ||
* action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series | ||
Credits | ||
------- | ||
Thank you [ooooooo_q](https://hackerone.com/ooooooo_q) for reporting this! | ||
cvss_v3: 6.1 | ||
unaffected_versions: | ||
- "< 7.1.0" | ||
patched_versions: | ||
- "~> 7.1.3.4" | ||
- ">= 7.2.0.beta2" | ||
related: | ||
url: | ||
- https://nvd.nist.gov/vuln/detail/CVE-2024-32464 | ||
- https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6 | ||
- https://github.com/rails/rails/commit/e215bf3360e6dfe1497c1503a495e384ed6b0995 | ||
- https://github.com/advisories/GHSA-prjp-h48f-jgf6 |