schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 4
values | aliases
stringlengths 2
20
| summary
stringlengths 24
115
| details
stringlengths 47
1.85k
| severity
stringclasses 24
values | affected
stringlengths 90
2.44k
| references
stringlengths 161
4.51k
| database_specific
stringlengths 131
175
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-jjv7-qpx3-h62q | 2021-09-14T19:46:47Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7191'] | Denial-of-Service Memory Exhaustion in qs | Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing.
## Recommendation
Update to version 1.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/node-querystring/issues/104'}, {'type': 'WEB', 'url': 'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1380'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jjv7-qpx3-h62q'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/node-querystring'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/29'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60026'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21685987'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687928'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxvp-4xwc-jpp6 | 2023-01-23T18:04:55Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3226'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228033946/http://www.securityfocus.com/bid/75231'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/17'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9fh3-vh3h-q4g3 | 2023-05-12T17:06:32Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2932'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.r`b in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2932.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xqg8-cv3h-xppv | 2021-09-22T15:12:11Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-1369'] | SQL Injection in sequelize | Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter.
## Proof of Concept
```javascript
Test.findAndCountAll({
where: { id :1 },
order : [['id', 'UNTRUSTED USER INPUT']]
})
```
## Recommendation
Update to version 2.0.0-rc8 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/2906'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/2919'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/33'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gppp-5xc5-wfpx | 2023-08-25T23:11:25Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0155'] | Active Record allows bypassing of database-query restrictions | Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0155.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2609'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qrh-h9m2-5fvf | 2023-06-19T21:08:41Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-3009'] | Cross site scripting that affects rails | Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3009.yml'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36717'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1022824'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2009/dsa-1887'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/57666'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/36278'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/2544'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mgx3-27hr-mfgp | 2023-03-14T20:47:11Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1801'] | HTTParty does not restrict casts of string values | The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917229'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/httparty'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/httparty/CVE-2013-1801.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229101716/http://www.securityfocus.com/bid/58260'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r9c2-cr39-c8g6 | 2023-01-24T14:56:23Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7579'] | rails-html-sanitizer Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the `Rails::Html::FullSanitizer` class. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/12'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h77x-m5q8-c29h | 2023-08-25T23:23:23Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6109'] | Rack vulnerable to REDoS | `lib/rack/multipart.rb` in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack/'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/README.rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2013-0544.html'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:20Z', 'nvd_published_at': '2013-03-01T05:40:00Z'} |
1.4.0 | GHSA-h5g2-38x9-4gv3 | 2023-09-05T21:02:41Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-10173'] | archive-tar-minitar and minitar vulnerable to Path Traversal | Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a `..` (dot dot) in a TAR archive entry. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/halostatue/minitar'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201702-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214020917/http://www.securityfocus.com/bid/95874'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207111726/https://www.puppet.com/security/cve/cve-2016-10173'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3778'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/24/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/29/1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3fx5-fwvr-xrjg | 2021-09-22T20:19:52Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8315'] | Regular Expression Denial of Service in ms | Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Proof of Concept
```javascript
var ms = require('ms');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
ms(genstr(process.argv[2], "5") + " minutea");
```
### Results
Showing increase in execution time based on the input string.
```
$ time node ms.js 10000
real 0m0.758s
user 0m0.724s
sys 0m0.031s
$ time node ms.js 20000
real 0m2.580s
user 0m2.494s
sys 0m0.047s
$ time node ms.js 30000
real 0m5.747s
user 0m5.483s
sys 0m0.080s
$ time node ms.js 80000
real 0m41.022s
user 0m38.894s
sys 0m0.529s
```
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/millisecond/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96389'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gfjr-3jmm-4g9v | 2021-09-10T20:53:22Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8860'] | Symlink Arbitrary File Overwrite in tar | Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 2.0.0 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/releases/tag/v2.7.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/57'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6mq2-37j5-w6r6 | 2023-08-01T21:37:33Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-4492'] | WEBrick Improper Input Validation vulnerability | WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/webrick'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0908.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0909.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection'}, {'type': 'WEB', 'url': 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxf6-w9mp-95hm | 2023-05-12T17:24:42Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-3408'] | Puppet supports use of IP addresses in certnames without warning of potential risks | `lib/puppet/network/authstore.rb` in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839166'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3408.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3408-agent-impersonation'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3408/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:51Z', 'nvd_published_at': '2012-08-06T16:55:00Z'} |
1.4.0 | GHSA-59c7-4xj2-hgvw | 2023-01-23T20:38:10Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7578'] | rails-html-sanitizer Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v3rr-cph9-2g2q | 2023-01-23T18:02:54Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-2538'] | rack-ssl Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `lib/rack/ssl.rb` in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-ssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538'}, {'type': 'WEB', 'url': 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'}, {'type': 'PACKAGE', 'url': 'https://github.com/josh/rack-ssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack-ssl/CVE-2014-2538.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140524002455/http://secunia.com/advisories/57466'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228185649/http://www.securityfocus.com/bid/66314'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/19/20'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8fqx-7pv4-3jwm | 2023-05-26T16:54:58Z | 2017-10-24T18:33:38Z | null | ['CVE-2008-7248'] | Improper Input Validation in actionpack | Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=544329'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2008-7248.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'https://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/https://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/12/02/2'}, {'type': 'WEB', 'url': 'https://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/02/2'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:28Z', 'nvd_published_at': '2009-12-16T01:30:00Z'} |
1.4.0 | GHSA-fcqf-h4h4-695m | 2023-07-19T18:42:54Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-3186'] | actionpack CRLF injection vulnerability | CRLF injection vulnerability in `actionpack/lib/action_controller/response.rb` in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3186.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150201000000*/http://secunia.com/advisories/45921'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfjh-p3g4-3q2f | 2021-09-09T17:02:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-1370'] | VBScript Content Injection in marked | Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set.
## Proof of Concept ( IE10 Compatibility Mode Only )
`[xss link](vbscript:alert(1))`
will get a link
`<a href="vbscript:alert(1)">xss link</a>`
## Recommendation
Update to version 0.3.3 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24/versions'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jxx8-v83v-rhw3 | 2023-08-29T09:24:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1656'] | Spree Improper Input Validation vulnerability | Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) `payment_method` parameter to `core/app/controllers/spree/admin/payment_methods_controller.rb`; and the (2) `promotion_action parameter` to `promotion_actions_controller.rb`, (3) `promotion_rule parameter` to `promotion_rules_controller.rb`, and (4) `calculator_type` parameter to `promotions_controller.rb` in `promo/app/controllers/spree/admin/`, related to unsafe use of the constantize function. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0.rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/70092eb55b8be8fe5d21a7658b62da658612fba7'}, {'type': 'WEB', 'url': 'https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2013-1656.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130907044454/https://www.conviso.com.br/advisories/CVE-2013-1656.txt'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140329142330/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140618100330/http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w6rc-q387-vpgq | 2023-06-09T20:17:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4136'] | insecure temporary directory usage in passenger | ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}, {'type': 'WEB', 'url': 'https://code.google.com/p/phusion-passenger/issues/detail?id=910'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6rc-q387-vpgq'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-4136.yml'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/16/6'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j24p-r6wx-r79w | 2021-09-14T18:09:44Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-3287'] | High severity vulnerability that affects thin | lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'thin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3287'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j24p-r6wx-r79w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thin/CVE-2009-3287.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/macournoyer/thin'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/blob/master/CHANGELOG'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrr4-p6fq-hjg7 | 2023-07-05T20:50:18Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-0752'] | Directory traversal vulnerability in Action View in Ruby on Rails | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` (dot dot) in a pathname. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-p6fq-hjg7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210618005620/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210621170450/http://www.securityfocus.com/bid/81801'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210723192420/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40561/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/13'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mpxf-gcw2-pw5q | 2023-07-31T18:14:44Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-6414'] | actionpack Improper Input Validation vulnerability | `actionpack/lib/action_view/lookup_context.rb` in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6414.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160421165124/http://secunia.com/advisories/57836'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808161629/https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w37c-q653-qg95 | 2023-07-26T18:41:29Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6416'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the simple_format helper in `actionpack/lib/action_view/helpers/text_helper.rb` in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4b4f5847f64f81c961625e647711ef9f6ad1a454'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6416.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/5ZI1-H5OoIM/ZNq4FoR2GnIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228165109/http://www.securityfocus.com/bid/64071'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:19Z', 'nvd_published_at': '2013-12-07T00:55:00Z'} |
1.4.0 | GHSA-v2r9-c84j-v7xm | 2023-07-05T20:39:56Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0256'] | RDoc contains XSS vulnerability | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256'}, {'type': 'WEB', 'url': 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=907820'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm'}, {'type': 'PACKAGE', 'url': 'https://github.com/rdoc/rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0728.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:28Z', 'nvd_published_at': '2013-03-01T05:40:00Z'} |
1.4.0 | GHSA-87vv-r9j6-g5qv | 2022-06-07T14:31:25Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-4055'] | Regular Expression Denial of Service in moment | Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`.
## Proof of concept
```
var moment = require('moment');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
for (i=20000;i<=10000000;i=i+10000) {
console.log("COUNT: " + i);
var str = '-' + genstr(i, '1')
console.log("LENGTH: " + str.length);
var start = process.hrtime();
moment.duration(str)
var end = process.hrtime(start);
console.log(end);
}
```
### Results
```
$ node moment.js
COUNT: 20000
LENGTH: 20002
[ 0, 618931029 ]
COUNT: 30001
LENGTH: 30003
[ 1, 401413894 ]
COUNT: 40002
LENGTH: 40004
[ 2, 437075303 ]
COUNT: 50003
LENGTH: 50005
[ 3, 824664804 ]
COUNT: 60004
LENGTH: 60006
[ 5, 651335262 ]
```
## Recommendation
Please update to version 2.11.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/55'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-02'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95849'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:44Z', 'nvd_published_at': '2017-01-23T21:59:00Z'} |
1.4.0 | GHSA-78j3-7wpm-qhvp | 2023-07-05T19:12:35Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1947'] | Shell Metacharacter Injection in kelredd-pruview | kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to document.rb, video.rb, or video_image.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kelredd-pruview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-78j3-7wpm-qhvp'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kelredd-pruview/CVE-2013-1947.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/kelredd-pruview-cmd-inject.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/12/2'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5vx5-9q73-wgp4 | 2023-09-05T21:30:18Z | 2017-10-24T18:33:35Z | null | ['CVE-2017-7540'] | Safemode Gem Has Incomplete List of Disallowed Inputs | rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/pull/23'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}] | {'cwe_ids': ['CWE-184'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:24Z', 'nvd_published_at': '2017-07-21T22:29:00Z'} |
1.4.0 | GHSA-gr44-7grc-37vq | 2023-01-23T17:23:13Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0276'] | ActiveRecord vulnerable to modification of protected model attributes | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0276.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130217055442/http://www.securityfocus.com/bid/57896'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/5'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qj7-jvg4-qr2x | 2023-07-05T18:50:18Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2119'] | Phusion Passenger Denial of Service | Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in `/tmp/` before it is used by the gem. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=892813'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-2119.yml'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}] | {'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:24Z', 'nvd_published_at': '2014-01-03T18:54:00Z'} |
1.4.0 | GHSA-p65m-qr5x-rrqq | 2023-01-26T21:22:44Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7086'] | Webbynode Code Injection vulnerability | The message function in `lib/webbynode/notify.rb` in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'webbynode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086'}, {'type': 'WEB', 'url': 'https://github.com/webbynode/webbynode/pull/85'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webbynode/CVE-2013-7086.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbynode/webbynode'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229074410/http://www.securityfocus.com/bid/64289'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208124343/http://www.vapid.dhs.org/advisories/webbynode-command-inj.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/124421'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/493'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/497'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jmgf-p46x-982h | 2023-05-11T13:47:53Z | 2017-10-24T18:33:38Z | null | ['CVE-2008-5189'] | rails is vulnerable to CRLF injection | CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmgf-p46x-982h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2008-5189.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/32359'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pxh-h8hw-mj8w | 2023-08-28T12:50:30Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0183'] | Rack rubygems receiving excessively long lines triggers out-of-memory error | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895282'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0183.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rack.github.com/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0548.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2783'}] | {'cwe_ids': ['CWE-119', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:49Z', 'nvd_published_at': '2013-03-01T05:40:00Z'} |
1.4.0 | GHSA-jmgw-6vjg-jjwg | 2023-02-15T22:22:59Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0156'] | actionpack Improper Input Validation vulnerability | `active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140111025708/http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160415043747/https://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806154149/https://puppet.com/security/cve/cve-2013-0156/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0153.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0155.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2604'}, {'type': 'WEB', 'url': 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html'}, {'type': 'WEB', 'url': 'http://www.insinuator.net/2013/01/rails-yaml/'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/380039'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:48Z', 'nvd_published_at': '2013-01-13T22:55:00Z'} |
1.4.0 | GHSA-fh39-v733-mxfr | 2023-03-14T22:18:13Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2661'] | Active Record vulnerable to SQL Injection via nested query parameters | The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cj92-c4fj-w9c5 | 2023-09-05T21:10:15Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2139'] | Mail Gem Path Traversal vulnerability | Directory traversal vulnerability in `lib/mail/network/delivery_methods/file_delivery.rb` in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a `..` (dot dot) in the to parameter. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q4qq-fm7q-cwp5 | 2021-09-16T19:30:36Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7454'] | Multiple XSS Filter Bypasses in validator | Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter.
## Proof of Concept
Various inputs that could bypass the filter were discovered:
Improper parsing of nested tags:
```
<s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s>
```
Incomplete filtering of javascript: URIs:
```
<a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a>
```
UI Redressing:
```
<div style="z-index: 9999999; background-color: green; width: 100%; height: 100%">
<h1>You have won</h1>Please click the link and enter your login details:
<a href="http://example.com/">http://good.com</a>
</div>
```
Bypass via Nested Forbidden Strings:
```
<scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt>
```
Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of.
## Recommendation
If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/41'}, {'type': 'WEB', 'url': 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-76wq-xw4h-f8wj | 2023-05-12T17:04:06Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2695'] | activerecord vulnerable to SQL Injection | The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2695.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/l4L0TEVAz1k/m/Vr84sD9B464J'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jg4m-q6w8-vrjp | 2023-01-26T21:04:14Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4203'] | rgpg Code Injection vulnerability | The `self.run_gpg` function in `lib/rgpg/gpg_helper.rb` in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rgpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}, {'type': 'WEB', 'url': 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcook/rgpg'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rgpg/CVE-2013-4203.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/08/03/2'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-574q-fxfj-wv6h | 2023-05-12T17:26:05Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1655'] | Puppet Improper Input Validation vulnerability | Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-1655/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228144801/http://www.securityfocus.com/bid/58442'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-1655-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1759-1'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2643'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5726-g6r9-5f22 | 2022-02-25T19:54:10Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7192'] | Potential for Script Injection in syntax-error | Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified.
## Recommendation
Update to version 1.1.1 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'syntax-error'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5726-g6r9-5f22'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-browserify/blob/master/changelog.markdown#421'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/node-syntax-error'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/37'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21690815'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w754-gq8r-pf5f | 2023-08-29T14:01:28Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2616'] | MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection | `lib/mini_magick.rb` in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2013-2616.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130315095512/http://www.securityfocus.com/bid/58448'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/123'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ww79-8xwv-932x | 2023-08-28T16:11:35Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0036'] | rbovirt uses the rest-client gem with SSL verification disabled | The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rbovirt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595'}, {'type': 'PACKAGE', 'url': 'https://github.com/abenari/rbovirt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rbovirt/CVE-2014-0036.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/509'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8r6h-7x9g-xmw9 | 2023-01-23T20:49:57Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6459'] | will_paginate Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'will_paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/mislav/will_paginate'}, {'type': 'WEB', 'url': 'https://github.com/mislav/will_paginate/releases/tag/v3.0.5'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150709163604/http://www.securityfocus.com/bid/64509'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rxq3-gm4p-5fj4 | 2023-05-11T13:58:44Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-2422'] | rails vulnerable to improper authentication | The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-2422.yml'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/35702'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/35579'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/1802'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qrgf-jqqm-x7xv | 2023-01-24T14:54:19Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-5671'] | Code injection in dragonfly gem | `lib/dragonfly/imagemagickutils.rb` in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fog-dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/520'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/486'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208033320/http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Sep/18'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/526'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/528'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jxhw-mg8m-2pj8 | 2023-01-23T21:20:12Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0233'] | Devise does not properly perform type conversion when performing database queries | Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233'}, {'type': 'WEB', 'url': 'https://github.com/Snorby/snorby/issues/261'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140726005251/http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103406/http://www.securityfocus.com/bid/57577'}, {'type': 'WEB', 'url': 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html'}, {'type': 'WEB', 'url': 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/01/29/3'}] | {'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xf96-32q2-9rw2 | 2023-05-26T16:40:08Z | 2017-10-24T18:33:38Z | null | ['CVE-2008-4094'] | Rails ActiveRecord gem vulnerable to SQL injection | Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) `:limit` and (2) `:offset` parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ef0ea782b1f5cf7b08e74ea3002a16c708f66645'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2008-4094.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620000955/http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201733/http://blog.innerewut.de/files/rails/activerecord-1.15.3.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201744/http://blog.innerewut.de/files/rails/activerecord-2.0.2.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081104151751/http://gist.github.com/8946'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081113122736/http://secunia.com/advisories/31875/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211431/http://secunia.com/advisories/31909'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211436/http://secunia.com/advisories/31910'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20091101000000*/http://www.vupen.com/english/advisories/2008/2562'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120120194518/http://www.securityfocus.com/bid/31176'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207112829/http://www.securitytracker.com/id?1020871'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/288'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/964'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/16/1'}, {'type': 'WEB', 'url': 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fqrr-rrwg-69pv | 2023-07-05T18:46:48Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-1233'] | Local API Login Credentials Disclosure in paratrooper-pingdom | The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process.
### Vulnerable Code:
From: `paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb`
```ruby
def setup(options = {})
%x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]
end
def teardown(options = {})
%x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"]
end
```
A malicious user could monitor the process tree to steal the API key, username and password for the API login.
| [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-pingdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-pingdom/CVE-2014-1233.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/1'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:08Z', 'nvd_published_at': '2014-01-10T12:02:00Z'} |
1.4.0 | GHSA-543v-gj2c-r3ch | 2023-06-30T21:32:03Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-0753'] | activemodel contains Improper Input Validation | Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/14'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-552w-rqg8-gxxm | 2021-09-01T19:26:29Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7453'] | Moderate severity vulnerability that affects validator | The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-552w-rqg8-gxxm'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c5qq-g673-5p49 | 2023-05-12T17:08:19Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-1989'] | Puppet allows local users to overwrite arbitrary files via a symlink attack | `telnet.rb` in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (`/tmp/out.log`). | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.1'}, {'fixed': '2.7.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1989.yml'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/15087408'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-1989-arbitrary-file-write-access'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/issues/13606'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-1989/'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1419-1'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hqf9-rc9j-5fmj | 2023-07-05T17:50:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0080'] | Array data injection vulnerability in activerecord | SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving `\` (backslash) characters that are not properly handled in operations on array columns. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0.beta1'}, {'fixed': '4.1.0.beta2'}]}], 'versions': ['4.1.0.beta1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-0080.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210301004521/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/Wu96YkTUR6s/pPLBMZrlwvYJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/9'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-73qw-ww62-m54x | 2023-01-25T23:05:06Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7541'] | colorscore Command Injection vulnerability | The initialize method in the Histogram class in `lib/colorscore/histogram.rb` in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) `image_path`, (2) `colors`, or (3) `depth` variable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'WEB', 'url': 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}, {'type': 'PACKAGE', 'url': 'https://github.com/quadule/colorscore'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/colorscore/CVE-2015-7541.yml'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2015-7541/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q1/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7f4-5w9j-23p2 | 2023-01-25T23:16:58Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-10194'] | festivaltts4r allows arbitrary command execution | The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'WEB', 'url': 'https://github.com/spejman/festivaltts4r/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/spejman/festivaltts4r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vx9j-46rh-fqr8 | 2023-07-05T20:44:17Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-2097'] | actionview contains Path Traversal vulnerability | There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097.
Versions Affected: 3.2.x, 4.0.x, 4.1.x
Not affected: 4.2+
Fixed Versions: 3.2.22.2, 4.1.14.2
Impact
------
Applications that pass unverified user input to the `render` method in a controller may be vulnerable to an information leak vulnerability.
Impacted code will look something like this:
```ruby
def index
render params[:id]
end
```
Carefully crafted requests can cause the above code to render files from unexpected places like outside the application's view directory, and can possibly escalate this to a remote code execution attack.
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
--------
The FIXED releases are available at the normal locations.
Workarounds
-----------
A workaround to this issue is to not pass arbitrary user input to the `render` method. Instead, verify that data before passing it to the `render` method.
For example, change this:
```ruby
def index
render params[:id]
end
```
To this:
```ruby
def index
render verify_template(params[:id])
end
private
def verify_template(name)
# add verification logic particular to your application here
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for it. It is in git-am format and consist of a single changeset.
* 3-2-render_data_leak_2.patch - Patch for 3.2 series
* 4-1-render_data_leak_2.patch - Patch for 4.1 series
Credits
-------
Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this and working with us in the patch! | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a1d3ea617ffb0c8ae8467fa439bf63a3bfc4324'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ddY6HgqB2z4'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160322002234/http://www.securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015320/http://www.securityfocus.com/bid/83726'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201221115217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c9c5-9fpr-m882 | 2023-01-25T23:16:15Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-9490'] | sentry-raven allows remote attackers to cause a denial of service via a large exponent value in a scientific number | The `numtok` function in `lib/raven/okjson.rb` in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sentry-raven'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/raven-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sentry-raven/CVE-2014-9490.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/getsentry/Cz5bih0ZY1U'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2015/q1/26'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v633-x5vv-hqwc | 2021-09-20T15:12:25Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8856'] | Cross-Site Scripting in serve-index | Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application.
## Recommendation
Update to version 1.6.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'serve-index'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/commit/7381a1d1458959e57ee53ac932b06ff17904777e'}, {'type': 'PACKAGE', 'url': 'https://github.com/expressjs/serve-index'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96392'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4jm3-pfpf-h54p | 2023-01-25T22:57:24Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-10193'] | espeak-ruby allows arbitrary command execution | The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the `speak`, `save`, `bytes` or `bytes_wav` method in `lib/espeak/speech.rb`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/commit/5251744b13bdd9fb0c72c612226e72d330bac143'}, {'type': 'PACKAGE', 'url': 'https://github.com/dejan/espeak-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/espeak-ruby/CVE-2016-10193.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x46-7rrv-m4h8 | 2023-05-12T16:04:23Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0995'] | sqlite3-ruby uses weak permissions for unspecified files, which allows local users to gain privileges | The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sqlite3-ruby/CVE-2011-0995.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schuyler/sqlite3-ruby'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20110513184951/http://support.novell.com/security/cve/CVE-2011-0995.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229151908/http://www.securityfocus.com/bid/47694'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201106213407/https://bugzilla.novell.com/show_bug.cgi?id=685928'}, {'type': 'WEB', 'url': 'https://www.suse.com/security/cve/CVE-2011-0995.html'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h6g-gp95-x3q5 | 2022-04-25T20:52:00Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7581'] | actionpack is vulnerable to denial of service because of a wildcard controller route | actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7581.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81677'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200516093752/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/16'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mx9f-w8qq-q5jf | 2023-01-23T21:26:28Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3448'] | rest-client allows local users to obtain sensitive information by reading the log | REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/349'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228154247/http://www.securityfocus.com/bid/74415'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fjfg-q662-gm6j | 2023-05-11T13:40:44Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-5379'] | Moderate severity vulnerability that affects rails | Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjfg-q662-gm6j'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5379.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8453'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://osvdb.org/40717'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jxj-9r5f-w3m2 | 2023-05-12T17:05:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3866'] | Puppet allows local users to obtain sensitive configuration information | `lib/puppet/defaults.rb` in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for `last_run_report.yaml`, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3866.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3866-lastrunreportyaml-world-readable'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3866/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7cgp-c3g7-qvrw | 2023-06-30T21:25:19Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0082'] | actionpack Improper Input Validation vulnerability | `actionpack/lib/action_view/template/text.rb` in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the `:text` option to the `render` method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0082.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207044540/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220315115444/https://puppet.com/security/cve/cve-2014-0082'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c92m-rrrc-q5wf | 2023-09-05T21:11:43Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-3693'] | safemode gem allows context-dependent attackers to obtain sensitive information via the inspect method | The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}, {'type': 'WEB', 'url': 'http://projects.theforeman.org/issues/14635'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2016-3693/'}, {'type': 'WEB', 'url': 'http://theforeman.org/security.html#2016-3693'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/8'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:40Z', 'nvd_published_at': '2016-05-20T14:59:00Z'} |
1.4.0 | GHSA-rfmf-rx8w-935w | 2023-07-03T21:20:17Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-5647'] | Sounder Contains Arbitrary Command Execution Vulnerability | lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sounder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamzaninovich/sounder'}, {'type': 'WEB', 'url': 'https://github.com/adamzaninovich/sounder/blob/v1.0.1/lib/sounder/sound.rb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rfmf-rx8w-935w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sounder/CVE-2013-5647.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3vfw-7rcp-3xgm | 2023-05-12T15:20:04Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-3187'] | actionpack Improper Input Validation vulnerability | The `to_s` method in `actionpack/lib/action_dispatch/middleware/remote_ip.rb` in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3187.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111209181000/http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html'}, {'type': 'WEB', 'url': 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6jvm-3j5h-79f6 | 2023-01-23T20:43:16Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-2963'] | paperclip Cross-site Scripting vulnerability | The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}, {'type': 'WEB', 'url': 'https://robots.thoughtbot.com/paperclip-security-release'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084907/http://www.securityfocus.com/bid/75304'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN83881261/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/19/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qpjp-7rp2-9c3f | 2021-09-16T20:03:05Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7451'] | Moderate severity vulnerability that affects validator | The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rvpq-5xqx-pfpp | 2023-05-11T13:57:05Z | 2017-10-24T18:33:38Z | null | ['CVE-2006-4111'] | Ruby on Rails vulnerable to code injection | Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp'}, {'type': 'WEB', 'url': 'https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4111.yml'}, {'type': 'WEB', 'url': 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/3237'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q6cw-2553-7837 | 2023-08-29T13:38:38Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0284'] | newrelic_rpm Gem Discloses Sensitive Information | Ruby agent 3.2.0 through 3.5.3.23 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'newrelic_rpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.5.3.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.3.23'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'}, {'type': 'PACKAGE', 'url': 'https://github.com/newrelic/newrelic-ruby-agent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/newrelic_rpm/CVE-2013-0284.yml'}, {'type': 'WEB', 'url': 'https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130117025417/https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2fqv-h3r5-m4vf | 2021-08-30T21:12:50Z | 2017-10-24T18:33:35Z | null | ['CVE-2017-1000006'] | Cross Site Scripting (XSS) in plotly.js | Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package.
## Recommendation
Update to 1.16.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'plotly.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}, {'type': 'WEB', 'url': 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/145'}, {'type': 'WEB', 'url': 'http://help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qqxp-xp9v-vvx6 | 2023-09-27T21:55:57Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6662'] | jquery-ui Tooltip widget vulnerable to XSS | Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2012-6662.yml'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8859'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8861'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9p3v-wf2w-v29c | 2021-09-08T20:12:31Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-4214'] | Moderate severity vulnerability that affects rails | Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p3v-wf2w-v29c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-4214.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37446'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38915'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/27/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/08/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/37142'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1023245'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/3352'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-78rc-8c29-p45g | 2023-07-03T18:58:43Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-2098'] | actionpack allows remote code execution via application's unrestricted use of render method | Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2098.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015318/http://www.securityfocus.com/bid/83725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210612214217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211205173437/https://securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40086/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6w6-xmqv-7q78 | 2023-05-12T17:14:49Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2930'] | activerecord vulnerable to SQL Injection | Multiple SQL injection vulnerabilities in the `quote_table_name` method in the ActiveRecord adapters in `activerecord/lib/active_record/connection_adapters/` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731438'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-2930.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jmm9-2p29-vh2w | 2023-05-12T17:17:16Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0448'] | activerecord vulnerable to SQL Injection | Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/354da43ab0a10b3b7b3f9cb0619aa562c3be8474'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-0448.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201220214809/http://securitytracker.com/id?1025063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gjxw-5w2q-7grf | 2023-05-26T16:50:51Z | 2017-10-24T18:33:38Z | null | ['CVE-2010-3933'] | Rails activerecord gem has Improper Input Validation vulnerability | Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.9'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d96bccb1e8b62e3e11ca0c5d38aaa8cece889ae'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/96183e0f284bab27667e5a38fa6a1578eb029585'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2010-3933.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20101129225633/http://securitytracker.com/alerts/2010/Oct/1024624.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/41930'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1024624'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7g65-ghrg-hpf5 | 2023-01-23T16:30:29Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3465'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e91e4e8bbee12ce1496bf384c04da6be296b687a'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r5hc-9xx5-97rw | 2023-07-04T00:12:42Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4492'] | i18n gem Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0380'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1039435'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/i18n/CVE-2013-4492.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/i18n'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208125214/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210731082547/http://www.securityfocus.com/bid/64076'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2830'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:45Z', 'nvd_published_at': '2013-12-07T00:55:00Z'} |
1.4.0 | GHSA-xwr3-fmgj-mmfr | 2023-08-25T20:12:12Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7111'] | Exposure of Sensitive Information in bio-basespace-sdk | The put_call function in the API client (`api/api_client.rb`) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the `API_KEY` on the command line, which allows remote attackers to obtain sensitive information by listing the processes. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bio-basespace-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bio-basespace-sdk/CVE-2013-7111.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/14/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/15/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xgj6-pgrm-x4r2 | 2023-01-26T22:31:40Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-6183'] | gtk2 vulnerable to Use of Externally-Controlled Format String | Format string vulnerability in the `mdiag_initialize` function in `gtk/src/rbgtkmessagedialog.c` in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gtk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=402871'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228174159/http://www.securityfocus.com/bid/26616'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207224244/https://www.securityfocus.com/archive/1/484240/100/0/threaded'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=200623'}, {'type': 'WEB', 'url': 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200712-09.xml'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/3407'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2007/dsa-1431'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2008:033/?name=MDVSA-2008:033'}] | {'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4c4w-3q45-hp9j | 2023-01-25T22:56:46Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7463'] | Aescrypt does not sufficiently use random values | The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'aescrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7463'}, {'type': 'WEB', 'url': 'https://github.com/Gurpartap/aescrypt/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gurpartap/aescrypt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/aescrypt/CVE-2013-7463.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227173428/http://www.securityfocus.com/bid/98035'}] | {'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pchc-949f-53m5 | 2023-02-13T17:01:58Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0175'] | Improper Input Validation in multi_xml | multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'multi_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'}, {'type': 'WEB', 'url': 'https://github.com/sferik/multi_xml/pull/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/sferik/multi_xml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=5040457'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2013/01/11/9'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:50Z', 'nvd_published_at': '2013-04-25T23:55:00Z'} |
1.4.0 | GHSA-j96r-xvjq-r9pg | 2023-01-23T17:49:35Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3227'] | activesupport vulnerable to Denial of Service via large XML document depth | The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228041703/http://www.securityfocus.com/bid/75234'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/16'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92w9-2pqw-rhjj | 2023-01-23T16:31:49Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-3424'] | actionpack Improper Authentication vulnerability | The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a `with_http_digest` helper method, as demonstrated by the `authenticate_or_request_with_http_digest` method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fhj9-cjjh-27vm | 2023-03-14T22:15:51Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0277'] | Active Record contains deserialization of arbitrary YAML | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0277.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0277'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1028109'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/6'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g266-3crh-h7gj | 2023-08-29T16:28:48Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1911'] | ldoce Gem Arbitrary Command Execution | `lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ldoce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911'}, {'type': 'WEB', 'url': 'https://github.com/markburns/ldoce/issues/1'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163'}, {'type': 'PACKAGE', 'url': 'https://github.com/markburns/ldoce'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ldoce/CVE-2013-1911.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229102422/http://www.securityfocus.com/bid/58783'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.html'}, {'type': 'WEB', 'url': 'http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/31/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58783'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m46p-ggm5-5j83 | 2023-07-05T20:33:59Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0081'] | Rails vulnerable to Cross-site Scripting | There is an XSS vulnerability in the `number_to_currency`, `number_to_percentage` and `number_to_human` helpers in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2014-0081.
Versions Affected: All.
Fixed Versions: 4.1.0.beta2, 4.0.3, 3.2.17.
Impact
------
These helpers allows users to nicely format a numeric value. Some of the parameters to the helper (format, negative_format and units) are not escaped correctly. Applications which pass user controlled data as one of these parameters are vulnerable to an XSS attack.
All users passing user controlled data to these parameters of the number helpers should either upgrade or use one of the workarounds immediately.
Releases
--------
The 4.1.0.rc1, 4.0.3 and 3.2.17 releases are available at the normal locations.
Workarounds
-----------
The workaround for this issue is to escape the value passed to the parameter.
For example, replace code like this:
```ruby
<%= number_to_currency(1.02, format: params[:format]) %>
```
With code like this
```ruby
<%= number_to_currency(1.02, format: h(params[:format])) %>
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 4-1-beta-number_helpers_xss.patch - Patch for 4.1-beta series
* 4-0-number_helpers_xss.patch - Patch for 4.0 series
* 3-2-number_helpers_xss.patch - Patch for 3.2 series
Please note that only the 4.0.x and 3.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thanks to Kevin Reintjes for reporting the issue to us.
--
Aaron Patterson
http://tenderlovemaking.com/
| [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140911141416/http://www.securitytracker.com/id/1029782'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170307202606/http://www.securityfocus.com/bid/65647'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207045136/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/8'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-84fq-6626-w5fg | 2020-08-31T18:07:28Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7193'] | CORS Token Disclosure in crumb | When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user.
A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all.
## Recommendation
Update to version 3.0.0 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'crumb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'WEB', 'url': 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-84fq-6626-w5fg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/4'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:14Z', 'nvd_published_at': '2014-12-25T11:59:00Z'} |
1.4.0 | GHSA-6c8p-qphv-668v | 2023-06-09T20:18:48Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1812'] | Denial of service in ruby-openid | The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/pull/43'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=918134'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6c8p-qphv-668v'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/ruby-openid'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-openid/CVE-2013-1812.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/03/8'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v9v4-7jp6-8c73 | 2023-04-20T21:47:18Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2197'] | rails Cross-site Scripting vulnerability | The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/53a2c0baf2b128dd4808eca313256f6f4bb8c4cd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ed3796434af6069ced6a641293cf88eef3b284da'}, {'type': 'WEB', 'url': 'https://gist.github.com/NZKoz/b2ceb626fc2bcdfe497f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2197.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/09/2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/13/9'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmr4-7g9q-7hc7 | 2020-06-17T16:30:43Z | 2017-10-24T18:33:36Z | 2020-06-17T16:30:43Z | [] | Moderate severity vulnerability that affects handlebars | **Withdrawn:** Duplicate of GHSA-9prh-257w-9277 | [] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vm28-mrm7-fpjq | 2023-08-28T16:26:10Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-2888'] | sfpagent Command Injection vulnerability | `lib/sfpagent/bsig.rb` in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sfpagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/herry13/sfpagent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sfpagent/CVE-2014-2888.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201029141944/http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Apr/243'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/18/4'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:58Z', 'nvd_published_at': '2014-04-23T15:55:00Z'} |
1.4.0 | GHSA-xrr6-3pc4-m447 | 2023-08-25T23:37:47Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7577'] | Active Record Improper Access Control | `activerecord/lib/active_record/nested_attributes.rb` in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.beta1'}, {'fixed': '5.0.0.beta1.1'}]}], 'versions': ['5.0.0.beta1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2015-7577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/10'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cf36-985g-v73c | 2023-01-23T21:12:18Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4562'] | omniauth-facebook Cross-Site Request Forgery vulnerability | The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-facebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562'}, {'type': 'WEB', 'url': 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkdynamic/omniauth-faceboo'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/264'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/267'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxr8-833v-c7wc | 2023-05-26T21:06:30Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-4319'] | Cross-site Scripting vulnerability in i18n translations helper method | Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4319'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d5b105d4bcb652550dda8b5613376d1b8beb70c'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ba2d85012088fd0db0fab98b2e512c77c83cbade'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/71364'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-4319.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228155840/http://www.securityfocus.com/bid/50722'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210307005941/http://www.securitytracker.com/id?1026342'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5?pli=1'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/c65c24fbc4b6dd82?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/11/18/8'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q759-hwvc-m3jg | 2023-08-25T20:06:33Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1855'] | actionpack Cross-site Scripting vulnerability | The `sanitize_css` method in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle `\n` (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1855'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0698'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1855'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=921331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-1855.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0698.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:17Z', 'nvd_published_at': '2013-03-19T22:55:00Z'} |