File tree Expand file tree Collapse file tree 4 files changed +190
-0
lines changed Expand file tree Collapse file tree 4 files changed +190
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : actionmailer
3+ framework : rails
4+ cve : 2024-47889
5+ ghsa : h47h-mwp9-c6q6
6+ url : https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6
7+ title : Possible ReDoS vulnerability in block_format in Action Mailer
8+ date : 2024-10-15
9+ description : |
10+ There is a possible ReDoS vulnerability in the block_format helper
11+ in Action Mailer. This vulnerability has been assigned the
12+ CVE identifier CVE-2024-47889.
13+
14+ ## Impact
15+
16+ Carefully crafted text can cause the block_format helper to take an
17+ unexpected amount of time, possibly resulting in a DoS vulnerability.
18+ All users running an affected release should either upgrade or apply
19+ the relevant patch immediately.
20+
21+ Ruby 3.2 has mitigations for this problem, so Rails applications
22+ using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires
23+ Ruby 3.2 or greater so is unaffected.
24+
25+ ## Releases
26+
27+ The fixed releases are available at the normal locations.
28+
29+ ## Workarounds
30+
31+ Users can avoid calling the `block_format` helper or upgrade
32+ to Ruby 3.2.
33+
34+ ##Credits
35+
36+ Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!
37+ unaffected_versions :
38+ - " < 3.0.0"
39+ patched_versions :
40+ - " ~> 6.1.7.9"
41+ - " ~> 7.0.8.5"
42+ - " ~> 7.1.4.1"
43+ - " >= 7.2.1.1"
44+ related :
45+ url :
46+ - https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6
47+ - https://github.com/advisories/GHSA-h47h-mwp9-c6q6
Original file line number Diff line number Diff line change 1+ ---
2+ gem : actionpack
3+ framework : rails
4+ cve : 2024-41128
5+ ghsa : x76w-6vjr-8xgj
6+ url : https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj
7+ title : Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
8+ date : 2024-10-15
9+ description : |
10+ There is a possible ReDoS vulnerability in the query parameter
11+ filtering routines of Action Dispatch. This vulnerability has
12+ been assigned the CVE identifier CVE-2024-41128.
13+
14+ ## Impact
15+
16+ Carefully crafted query parameters can cause query parameter
17+ filtering to take an unexpected amount of time, possibly resulting
18+ in a DoS vulnerability. All users running an affected release
19+ should either upgrade or apply the relevant patch immediately.
20+
21+ Ruby 3.2 has mitigations for this problem, so Rails applications
22+ using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends
23+ on Ruby 3.2 or greater so is unaffected.
24+
25+ ## Releases
26+
27+ The fixed releases are available at the normal locations.
28+
29+ ## Workarounds
30+
31+ Users on Ruby 3.2 are unaffected by this issue.
32+
33+ ## Credits
34+
35+ Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!
36+ unaffected_versions :
37+ - " < 3.1.0"
38+ patched_versions :
39+ - " ~> 6.1.7.9"
40+ - " ~> 7.0.8.5"
41+ - " ~> 7.1.4.1"
42+ - " >= 7.2.1.1"
43+ related :
44+ url :
45+ - https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj
46+ - https://github.com/advisories/GHSA-x76w-6vjr-8xgj
Original file line number Diff line number Diff line change 1+ ---
2+ gem : actionpack
3+ framework : rails
4+ cve : 2024-47887
5+ ghsa : vfg9-r3fq-jvx4
6+ url : https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4
7+ title : Possible ReDoS vulnerability in HTTP Token authentication
8+ in Action Controller
9+ date : 2024-10-15
10+ description : |
11+ There is a possible ReDoS vulnerability in Action Controller's
12+ HTTP Token authentication. This vulnerability has been assigned
13+ the CVE identifier CVE-2024-47887.
14+
15+ ## Impact
16+
17+ For applications using HTTP Token authentication via
18+ `authenticate_or_request_with_http_token` or similar, a carefully
19+ crafted header may cause header parsing to take an unexpected amount
20+ of time, possibly resulting in a DoS vulnerability. All users running
21+ an affected release should either upgrade or apply the relevant
22+ patch immediately.
23+
24+ Ruby 3.2 has mitigations for this problem, so Rails applications
25+ using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends
26+ on Ruby 3.2 or greater so is unaffected.
27+
28+ ## Releases
29+
30+ The fixed releases are available at the normal locations.
31+
32+ ## Workarounds
33+
34+ Users on Ruby 3.2 are unaffected by this issue.
35+
36+ ## Credits
37+
38+ Thanks to [scyoon](https://hackerone.com/scyoon) for reporting
39+ unaffected_versions :
40+ - " < 4.0.0"
41+ patched_versions :
42+ - " ~> 6.1.7.9"
43+ - " ~> 7.0.8.5"
44+ - " ~> 7.1.4.1"
45+ - " >= 7.2.1.1"
46+ related :
47+ url :
48+ - https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4
49+ - https://github.com/advisories/GHSA-vfg9-r3fq-jvx4
Original file line number Diff line number Diff line change 1+ ---
2+ gem : actiontext
3+ framework : rails
4+ cve : 2024-47888
5+ ghsa : wwhv-wxv9-rpgw
6+ url : https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw
7+ title : Possible ReDoS vulnerability in plain_text_for_blockquote_node
8+ in Action Text
9+ date : 2024-10-15
10+ description : |
11+ There is a possible ReDoS vulnerability in the
12+ plain_text_for_blockquote_node helper in Action Text. This
13+ vulnerability has been assigned the CVE identifier CVE-2024-47888.
14+
15+ ## Impact
16+
17+ Carefully crafted text can cause the plain_text_for_blockquote_node
18+ helper to take an unexpected amount of time, possibly resulting
19+ in a DoS vulnerability. All users running an affected release should
20+ either upgrade or apply the relevant patch immediately.
21+
22+ Ruby 3.2 has mitigations for this problem, so Rails applications
23+ using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends
24+ on Ruby 3.2 or greater so is unaffected.
25+
26+ ## Releases
27+
28+ The fixed releases are available at the normal locations.
29+
30+ ## Workarounds
31+
32+ Users can avoid calling `plain_text_for_blockquote_node` or
33+ upgrade to Ruby 3.2.
34+
35+ ## Credits
36+
37+ Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!
38+ unaffected_versions :
39+ - " < 6.0.0"
40+ patched_versions :
41+ - " ~> 6.1.7.9"
42+ - " ~> 7.0.8.5"
43+ - " ~> 7.1.4.1"
44+ - " >= 7.2.1.1"
45+ related :
46+ url :
47+ - https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw
48+ - https://github.com/advisories/GHSA-wwhv-wxv9-rpgw
You can’t perform that action at this time.
0 commit comments