-
Notifications
You must be signed in to change notification settings - Fork 41
activesupport-7.2.3.gem: 3 vulnerabilities (highest severity is: 7.5) #233
Description
Vulnerable Library - activesupport-7.2.3.gem
A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.
Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem
Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock
Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem
Vulnerabilities
| Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (activesupport version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2026-33176 | 7.5 | Not Defined | 0.0% | activesupport-7.2.3.gem | Direct | https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.5,https://github.com/rails/rails.git - v8.1.2.1 | ✅ | ||
| CVE-2026-33169 | 5.3 | Not Defined | 0.0% | activesupport-7.2.3.gem | Direct | https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v7.2.3.1 | ✅ | ||
| CVE-2026-33170 | 4.3 | Not Defined | 0.0% | activesupport-7.2.3.gem | Direct | https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.5 | ✅ |
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2026-33176
Vulnerable Library - activesupport-7.2.3.gem
A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.
Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem
Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock
Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem
Dependency Hierarchy:
- ❌ activesupport-7.2.3.gem (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. "1e10000"), which "BigDecimal" expands into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Publish Date: 2026-03-23
URL: CVE-2026-33176
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-23
Fix Resolution: https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.5,https://github.com/rails/rails.git - v8.1.2.1
In order to enable automatic remediation, please create workflow rules
CVE-2026-33169
Vulnerable Library - activesupport-7.2.3.gem
A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.
Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem
Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock
Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem
Dependency Hierarchy:
- ❌ activesupport-7.2.3.gem (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. "NumberToDelimitedConverter" uses a lookahead-based regular expression with "gsub!" to insert thousands delimiters. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, the interaction between the repeated lookahead group and "gsub!" can produce quadratic time complexity on long digit strings. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Publish Date: 2026-03-23
URL: CVE-2026-33169
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-23
Fix Resolution: https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v7.2.3.1
In order to enable automatic remediation, please create workflow rules
CVE-2026-33170
Vulnerable Library - activesupport-7.2.3.gem
A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.
Library home page: https://rubygems.org/gems/activesupport-7.2.3.gem
Path to dependency file: /BasicVideoChatNewArchitecture/Gemfile.lock
Path to vulnerable library: /MultipartyNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/MultipartyNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/BasicVideoChatNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/cache/activesupport-7.2.3.gem,/ArchivingNewArchitecture/vendor/bundle/ruby/3.2.0/cache/activesupport-7.2.3.gem
Dependency Hierarchy:
- ❌ activesupport-7.2.3.gem (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, "SafeBuffer#%" does not propagate the "@html_unsafe" flag to the newly created buffer. If a "SafeBuffer" is mutated in place (e.g. via "gsub!") and then formatted with "%" using untrusted arguments, the result incorrectly reports "html_safe? == true", bypassing ERB auto-escaping and possibly leading to XSS. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Publish Date: 2026-03-23
URL: CVE-2026-33170
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.0%
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-23
Fix Resolution: https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v8.0.5
In order to enable automatic remediation, please create workflow rules
In order to enable automatic remediation for this issue, please create workflow rules