Skip to content

Commit 07bc967

Browse files
jasnowpostmodern
authored andcommitted
2 more advisories resulting from reclassifying 'rails' gems to sub-rails-gems
1 parent c6c0993 commit 07bc967

File tree

2 files changed

+67
-0
lines changed

2 files changed

+67
-0
lines changed

gems/actionpack/CVE-2011-0446.yml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
gem: actionpack
3+
framework: rails
4+
cve: 2011-0446
5+
ghsa: 75w6-p6mg-vh8j
6+
url: https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ
7+
title: XSS vulnerabilities in the mail_to helper in rails/actionpack
8+
date: 2017-10-24
9+
description: |
10+
Multiple cross-site scripting (XSS) vulnerabilities in the mail_to
11+
helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when
12+
javascript encoding is used, allow remote attackers to inject
13+
arbitrary web script or HTML via a crafted (1) name or (2) email value.
14+
cvss_v2: 4.3
15+
patched_versions:
16+
- "~> 2.3.11"
17+
- ">= 3.0.4"
18+
related:
19+
url:
20+
- https://nvd.nist.gov/vuln/detail/CVE-2011-0446
21+
- https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ
22+
- https://github.com/advisories/GHSA-75w6-p6mg-vh8j
23+
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html
24+
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html
25+
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html
26+
- http://www.debian.org/security/2011/dsa-2247
27+
- https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274
28+
- https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666
29+
- https://web.archive.org/web/20201208053819/http://www.securitytracker.com/id?1025064
30+
- https://web.archive.org/web/20210121211512/http://www.securityfocus.com/bid/46291
31+
- https://github.com/rails/rails/commit/abe97736b8316f1b714cac56c115c0779aa73217
32+
- https://github.com/rails/rails/commit/e3dd2107c57a8efaaea5d61cf8da65f7444760b2
33+
- https://github.com/advisories/GHSA-75w6-p6mg-vh8j

gems/activesupport/CVE-2009-3086.yml

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
gem: activesupport
3+
framework: rails
4+
cve: 2009-3086
5+
ghsa: fg9w-g6m4-557j
6+
url: http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails
7+
title: actionpack and activesupport vulnerable to information leaks
8+
date: 2017-10-24
9+
description: |
10+
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x
11+
before 2.3.4, leaks information about the complexity of message-digest
12+
signature verification in the cookie store, which might allow remote
13+
attackers to forge a digest via multiple attempts.
14+
cvss_v2: 5.0
15+
unaffected_versions:
16+
- "< 2.1.0"
17+
patched_versions:
18+
- "~> 2.2.3"
19+
- ">= 2.3.4"
20+
related:
21+
url:
22+
- https://nvd.nist.gov/vuln/detail/CVE-2009-3086
23+
- http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails
24+
- https://github.com/advisories/GHSA-fg9w-g6m4-557j
25+
- http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
26+
- http://www.debian.org/security/2011/dsa-2260
27+
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2009-3086.yml
28+
- https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0
29+
- https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978
30+
- https://github.com/rails/rails/commit/d460c9a25560f43e7c3789abadf7b455053eb686
31+
- https://web.archive.org/web/20090906010200/http://www.vupen.com/english/advisories/2009/2544
32+
- https://web.archive.org/web/20090907001716/http://secunia.com/advisories/36600
33+
- https://web.archive.org/web/20200229150042/http://www.securityfocus.com/bid/37427
34+
- https://github.com/advisories/GHSA-fg9w-g6m4-557j

0 commit comments

Comments
 (0)