You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Denial of Service in uap-core when processing crafted User-Agent strings
13
+
date: 2020-03-10
14
+
description: |-
15
+
### Impact
16
+
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
title: Camaleon CMS vulnerable to remote code execution through code injection (GHSL-2024-185)
13
+
date: 2024-09-23
14
+
description: |
15
+
The [actions](https://github.com/owen2345/camaleon-cms/blob/feccb96e542319ed608acd3a16fa5d92f13ede67/app/controllers/camaleon_cms/admin/media_controller.rb#L51-L52) defined inside of the MediaController class do not check whether a given path is inside a certain path (e.g. inside the media folder). If an attacker performed an account takeover of an administrator account (See: GHSL-2024-184) they could delete arbitrary files or folders on the server hosting Camaleon CMS. The [crop_url](https://github.com/owen2345/camaleon-cms/blob/feccb96e542319ed608acd3a16fa5d92f13ede67/app/controllers/camaleon_cms/admin/media_controller.rb#L64-L65) action might make arbitrary file writes (similar impact to GHSL-2024-182) for any authenticated user possible, but it doesn't seem to work currently.
16
+
17
+
Arbitrary file deletion can be exploited with following code path:
18
+
The parameter folder flows from the actions method:
19
+
```ruby
20
+
def actions
21
+
authorize! :manage, :media if params[:media_action] != 'crop_url'
22
+
params[:folder] = params[:folder].gsub('//', '/') if params[:folder].present?
Where it is joined in an unchecked manner with the root folder and
40
+
then deleted.
41
+
42
+
## Proof of concept
43
+
The following request would delete the file README.md in the top folder of the Ruby on Rails application. (The values for auth_token, X-CSRF-Token and _cms_session would also need to be replaced with authenticated values in the curl command below)
title: omniauth-saml has dependency on ruby-saml version with Signature Wrapping
13
+
Attack issue
14
+
date: 2025-03-12
15
+
description: |-
16
+
### Summary
17
+
There are 2 new Critical Signature Wrapping Vulnerabilities (CVE-2025-25292, CVE-2025-25291) and a potential DDOS Moderated Vulneratiblity (CVE-2025-25293) affecting ruby-saml, a dependency of omniauth-saml.
18
+
19
+
The fix will be applied to ruby-saml and released 12 March 2025, under version 1.18.0.
20
+
21
+
Please [upgrade](https://github.com/omniauth/omniauth-saml/blob/master/omniauth-saml.gemspec#L16) the ruby-saml requirement to v1.18.0.
22
+
23
+
### Impact
24
+
Signature Wrapping Vulnerabilities allows an attacker to impersonate a user.
0 commit comments