File tree Expand file tree Collapse file tree 4 files changed +31
-0
lines changed Expand file tree Collapse file tree 4 files changed +31
-0
lines changed Original file line number Diff line number Diff line change @@ -10,6 +10,7 @@ advisory:
10
10
gem : actionpack
11
11
framework : rails
12
12
cve : 2024-26142
13
+ ghsa : jjhx-jhvp-74wq
13
14
url : https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946
14
15
title : Possible ReDoS vulnerability in Accept header parsing in Action Dispatch
15
16
date : 2024-02-21
Original file line number Diff line number Diff line change @@ -9,6 +9,7 @@ advisory:
9
9
gem : actionpack
10
10
framework : rails
11
11
cve : 2024-26143
12
+ ghsa : 9822-6m93-xqf4
12
13
url : https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
13
14
title : Possible XSS Vulnerability in Action Controller
14
15
date : 2024-02-21
@@ -57,6 +58,7 @@ advisory:
57
58
# Workarounds
58
59
59
60
There are no feasible workarounds for this issue.
61
+ cvss_v3 : 6.1
60
62
unaffected_versions :
61
63
- " < 7.0.0"
62
64
patched_versions :
Original file line number Diff line number Diff line change @@ -10,6 +10,7 @@ advisory:
10
10
gem : activestorage
11
11
framework : rails
12
12
cve : 2024-26144
13
+ ghsa : 8h22-8cf7-hq6g
13
14
url : https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945
14
15
title : Possible Sensitive Session Information Leak in Active Storage
15
16
date : 2024-02-21
@@ -43,6 +44,7 @@ advisory:
43
44
44
45
Upgrade to Rails 7.1.X, or configure caching proxies not to cache the
45
46
`Set-Cookie` headers.
47
+ cvss_v3 : 5.3
46
48
unaffected_versions :
47
49
- " < 5.2.0"
48
50
- " >= 7.1.0"
Original file line number Diff line number Diff line change
1
+ ---
2
+ layout : advisory
3
+ title : ' CVE-2023-51774 (json-jwt): json-jwt allows bypass of identity checks via a
4
+ sign/encryption confusion attack'
5
+ comments : false
6
+ categories :
7
+ - json-jwt
8
+ advisory :
9
+ gem : json-jwt
10
+ cve : 2023-51774
11
+ ghsa : c8v6-786g-vjx6
12
+ url : https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
13
+ title : json-jwt allows bypass of identity checks via a sign/encryption confusion
14
+ attack
15
+ date : 2024-02-29
16
+ description : |
17
+ The json-jwt (aka JSON::JWT) gem versions 1.16.5 and below sometimes allows
18
+ bypass of identity checks via a sign/encryption confusion attack.
19
+ For example, JWE can sometimes be used to bypass JSON::JWT.decode.
20
+ notes : Not patched yet
21
+ related :
22
+ url :
23
+ - https://nvd.nist.gov/vuln/detail/CVE-2023-51774
24
+ - https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md
25
+ - https://github.com/advisories/GHSA-c8v6-786g-vjx6
26
+ ---
You can’t perform that action at this time.
0 commit comments