Skip to content

Commit 0758aee

Browse files
committed
Sync with GitHub Security Advisories
* Add elastic-apm/CVE-2019-7615 * Add pdf_info/CVE-2022-36231 * Add missing CVSSv3 scores to other issues
1 parent b2adb3c commit 0758aee

File tree

7 files changed

+43
-3
lines changed

7 files changed

+43
-3
lines changed

gems/actionpack/CVE-2023-22797.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ description: |-
3434
# Workarounds
3535
3636
There are no feasible workarounds for this issue.
37+
cvss_v3: 6.1
3738
unaffected_versions:
3839
- "< 7.0.0"
3940
patched_versions:

gems/activerecord/CVE-2022-44566.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ description: |
2727
2828
Ensure that user supplied input which is provided to ActiveRecord clauses do
2929
not contain integers wider than a signed 64bit representation or floats.
30+
cvss_v3: 7.5
3031
patched_versions:
3132
- "~> 5.2.8, >= 5.2.8.15" # Rails LTS
3233
- "~> 6.1.7, >= 6.1.7.1"

gems/activerecord/CVE-2023-22794.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ description: |-
4949
5050
Avoid passing user input to annotate and avoid using QueryLogs configuration
5151
which can include user input.
52+
cvss_v3: 8.8
5253
unaffected_versions:
5354
- "< 6.0.0"
5455
patched_versions:

gems/elastic-apm/CVE-2019-7615.yml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
gem: elastic-apm
3+
cve: 2019-7615
4+
ghsa: 35j2-p8fh-x966
5+
url: https://github.com/elastic/apm-agent-ruby/pull/449
6+
title: Elastic APM agent for Ruby vulnerable to Improper Certificate Validation
7+
date: 2022-05-24
8+
description: |
9+
A TLS certificate validation flaw was found in Elastic APM agent for
10+
Ruby versions before 2.9.0. When specifying a trusted server CA certificate via
11+
the `server_ca_cert` setting, the Ruby agent would not properly verify the certificate
12+
returned by the APM server. This could result in a man in the middle style attack
13+
against the Ruby agent.
14+
cvss_v3: 7.4
15+
patched_versions:
16+
- ">= 2.9.0"
17+
related:
18+
url:
19+
- https://www.elastic.co/community/security/

gems/pdf_info/CVE-2022-36231.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
gem: pdf_info
3+
cve: 2022-36231
4+
ghsa: 9fh3-j99m-f4v7
5+
url: https://github.com/affix/CVE-2022-36231
6+
title: Code injection in pdf_info
7+
date: 2023-02-24
8+
description: |
9+
pdf_info 0.5.3 is vulnerable to Command Execution. An attacker using
10+
a specially crafted payload may execute OS commands by using command chaining because
11+
during object initalization there is no validation performed and the user provided
12+
path is used.
13+
related:
14+
url:
15+
- https://github.com/newspaperclub/pdf_info/issues/16
16+
- https://github.com/newspaperclub/pdf_info/pull/15

gems/rails-html-sanitizer/CVE-2018-3741.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,9 @@ description: |
1212
on target applications.
1313
1414
This issue is similar to CVE-2018-8048 in Loofah.
15+
cvss_v3: 6.1
1516
patched_versions:
16-
- '>= 1.0.4'
17+
- ">= 1.0.4"
1718
related:
1819
cve:
1920
- 2018-8048

gems/restforce/CVE-2018-3777.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ description: |
3232
If possible, applications should track salesforce IDs internally, rather than
3333
passing user-supplied IDs to salesforce. Such practice mitigates this
3434
vulnerability, and in general is desirable for ensuring strong access control.
35+
cvss_v3: 9.8
3536
patched_versions:
36-
- ~> 2.5.4
37-
- '>= 3.0.0'
37+
- "~> 2.5.4"
38+
- ">= 3.0.0"

0 commit comments

Comments
 (0)