Skip to content

Commit c6c0993

Browse files
jasnowpostmodern
authored andcommitted
Added 2 new rails-related gems
1 parent 432e641 commit c6c0993

File tree

2 files changed

+127
-0
lines changed

2 files changed

+127
-0
lines changed

gems/actionview/CVE-2023-23913.yml

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
---
2+
gem: actionview
3+
framework: rails
4+
cve: 2023-23913
5+
url: https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468
6+
title: DOM Based Cross-site Scripting in rails-ujs for
7+
contenteditable HTML Elements
8+
date: 2023-03-13
9+
description: |
10+
NOTE: rails-ujs is part of Rails/actionview since 5.1.0.
11+
12+
There is a potential DOM based cross-site scripting issue in rails-ujs
13+
which leverages the Clipboard API to target HTML elements that are
14+
assigned the contenteditable attribute. This has the potential to
15+
occur when pasting malicious HTML content from the clipboard that
16+
includes a data-method, data-remote or data-disable-with attribute.
17+
18+
This vulnerability has been assigned the CVE identifier CVE-2023-23913.
19+
20+
Not affected: < 5.1.0
21+
Versions Affected: >= 5.1.0
22+
Fixed Versions: 6.1.7.3, 7.0.4.3
23+
24+
Impact
25+
If the specified malicious HTML clipboard content is provided to a
26+
contenteditable element, this could result in the arbitrary execution
27+
of javascript on the origin in question.
28+
29+
Releases
30+
The FIXED releases are available at the normal locations.
31+
32+
Workarounds
33+
We recommend that all users upgrade to one of the FIXED versions.
34+
In the meantime, users can attempt to mitigate this vulnerability
35+
by removing the contenteditable attribute from elements in pages
36+
that rails-ujs will interact with.
37+
38+
Patches
39+
To aid users who aren’t able to upgrade immediately we have provided
40+
patches for the two supported release series. They are in git-am
41+
format and consist of a single changeset.
42+
43+
* rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series
44+
* rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series
45+
46+
Please note that only the 7.0.Z and 6.1.Z series are
47+
supported at present, and 6.0.Z for severe vulnerabilities.
48+
49+
Users of earlier unsupported releases are advised to upgrade as
50+
soon as possible as we cannot guarantee the continued availability
51+
of security fixes for unsupported releases.
52+
53+
Credits
54+
We would like to thank ryotak 15 for reporting this!
55+
56+
* rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB)
57+
* rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB)
58+
* rails-ujs-data-method-contenteditable-main.patch (8.9 KB)
59+
60+
cvss_v3: 7.5
61+
unaffected_versions:
62+
- "< 5.1.0"
63+
patched_versions:
64+
- "~> 6.1.7.3"
65+
- ">= 7.0.4.3"
66+
related:
67+
url:
68+
- https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468
69+
- https://www.cve.org/CVERecord?id=CVE-2023-23913
70+
- https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=aa67066c383f12dee5aee964667de4d8
71+
- https://access.redhat.com/security/cve/cve-2023-23913
72+
- https://bugzilla.redhat.com/show_bug.cgi?id=2182160
73+
- https://security.snyk.io/vuln/SNYK-RUBY-RAILS-5291540
74+
- https://www.suse.com/security/cve/CVE-2023-23913.html
75+
- https://security-tracker.debian.org/tracker/CVE-2023-23913
76+
- https://www.mend.io/vulnerability-database/CVE-2023-23913
77+
- https://github.com/jasnow/gsd-database/blob/main/2023/23xxx/GSD-2023-23913.json
78+
notes: "CVE has been reserved, but not filled out."

gems/kredis/CVE-2023-27531.yml

Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
---
2+
gem: kredis
3+
framework: rails
4+
cve: 2023-27531
5+
url: https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
6+
title: Possible Deserialization of Untrusted Data Vulnerability in Kredis JSON
7+
date: 2023-03-13
8+
description: |
9+
There is a deserialization of untrusted data vulnerability in
10+
the Kredis JSON deserialization code. This vulnerability has
11+
been assigned the CVE identifier CVE-2023-27531.
12+
13+
'Not affected: None.'
14+
'Versions Affected: All.'
15+
'Fixed Versions: 1.3.0.1'
16+
17+
Impact
18+
Carefully crafted JSON data processed by Kredis may result in
19+
deserialization of untrusted data, potentially leading to
20+
deserialization of unexpected objects in the system.
21+
22+
Any applications using Kredis with JSON are affected.
23+
24+
Releases
25+
The fixed releases are available at the normal locations.
26+
27+
Workarounds
28+
There are no feasible workarounds for this issue.
29+
30+
Patches
31+
To aid users who aren’t able to upgrade immediately we have
32+
provided patches for the two supported release series. They
33+
are in git-am format and consist of a single changeset.
34+
35+
* 1-3-0-1-kredis.patch - Patch for 1.3.0 series
36+
37+
Credits
38+
Thank you ooooooo_k 7 for reporting this!
39+
40+
patched_versions:
41+
- ">= 1.3.0.1"
42+
related:
43+
url:
44+
- https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
45+
- https://github.com/rails/kredis/releases/tag/v1.3.0.1
46+
- https://my.diffend.io/gems/kredis/1.3.0/1.3.0.1
47+
- https://cve.report/CVE-2023-27531
48+
- https://github.com/jasnow/gsd-database/blob/main/2023/27xxx/GSD-2023-27531.json
49+
notes: "CVE has be reserved, but not filled in."

0 commit comments

Comments
 (0)