File tree Expand file tree Collapse file tree 1 file changed +54
-0
lines changed Expand file tree Collapse file tree 1 file changed +54
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ layout : advisory
3+ title : ' CVE-2024-54133 (actionpack): Possible Content Security Policy bypass in Action
4+ Dispatch'
5+ comments : false
6+ categories :
7+ - actionpack
8+ - rails
9+ advisory :
10+ gem : actionpack
11+ framework : rails
12+ cve : 2024-54133
13+ ghsa : vfm5-rmrh-j26v
14+ url : https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
15+ title : Possible Content Security Policy bypass in Action Dispatch
16+ date : 2024-12-10
17+ description : |
18+ There is a possible Cross Site Scripting (XSS) vulnerability
19+ in the `content_security_policy` helper in Action Pack.
20+
21+ ## Impact
22+
23+ Applications which set Content-Security-Policy (CSP) headers
24+ dynamically from untrusted user input may be vulnerable to
25+ carefully crafted inputs being able to inject new directives
26+ into the CSP. This could lead to a bypass of the CSP and its
27+ protection against XSS and other attacks.
28+
29+ ## Releases
30+
31+ The fixed releases are available at the normal locations.
32+
33+ ## Workarounds
34+
35+ Applications can avoid setting CSP headers dynamically from
36+ untrusted input, or can validate/sanitize that input.
37+
38+ ## Credits
39+
40+ Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
41+ cvss_v4 : 2.3
42+ unaffected_versions :
43+ - " < 5.2.0"
44+ patched_versions :
45+ - " ~> 7.0.8.7"
46+ - " ~> 7.1.5.1"
47+ - " ~> 7.2.2.1"
48+ - " >= 8.0.0.1"
49+ related :
50+ url :
51+ - https://nvd.nist.gov/vuln/detail/CVE-2024-54133
52+ - https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
53+ - https://github.com/advisories/GHSA-vfm5-rmrh-j26v
54+ ---
You can’t perform that action at this time.
0 commit comments