schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringclasses 4
values | aliases
stringlengths 2
20
| summary
stringlengths 24
115
| details
stringlengths 47
1.85k
| severity
stringclasses 24
values | affected
stringlengths 90
2.44k
| references
stringlengths 161
4.51k
| database_specific
stringlengths 131
175
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-wwmf-6p58-6vj2 | 2023-06-12T16:42:56Z | 2017-10-24T18:33:38Z | null | ['CVE-2006-2582'] | Remote code execution in rwiki | The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0pre1'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rwiki/CVE-2006-2582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/20264'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/1949'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ffpv-c4hm-3x6v | 2023-07-31T21:08:45Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-0751'] | actionpack is vulnerable to denial of service via a crafted HTTP Accept header | actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/127967b735813cd4f263df7a50426d74e7e9cc17'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/221937c8ba1d291430ceddebbd4bdef7d3cb47d6'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/37047b779a177b911c7161052cfc34a30e1db0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0751.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128201702/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227181647/http://www.securityfocus.com/bid/81800'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/9'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x85-j5j2-27jx | 2023-02-15T22:22:18Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-0130'] | actionpack Path Traversal vulnerability | Directory traversal vulnerability in `actionpack/lib/abstract_controller/base.rb` in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0510'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0816'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1095105'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0130.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/NkKc7vTW70o'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140518192004/http://www.securityfocus.com/bid/67244'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150319054505/http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210411041816/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:36Z', 'nvd_published_at': '2014-05-07T10:55:00Z'} |
1.4.0 | GHSA-9c2j-593q-3g82 | 2023-06-01T19:51:36Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1856'] | activesupport Improper Input Validation vulnerability | The `ActiveSupport::XmlMini_JDOM` backend in `lib/active_support/xml_mini/jdom.rb` in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-1856.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x457-cw4h-hq5f | 2023-06-01T19:55:21Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0269'] | JSON gem has Improper Input Validation vulnerability | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130228082541/http://www.securityfocus.com/bid/57899'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160331131233/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1028.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1147.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/8'}, {'type': 'WEB', 'url': 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}, {'type': 'WEB', 'url': 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9rf5-jm6f-2fmm | 2023-08-25T22:56:38Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3514'] | Active Record subject to strong parameters protection bypass | `activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3514.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/08/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1102.html'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v5jg-558j-q67c | 2023-05-12T17:23:04Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2931'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the `strip_tags` helper in `actionpack/lib/action_controller/vendor/html-scanner/html/node.rb` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731436'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5jg-558j-q67c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2931.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p463-639r-q9g9 | 2023-01-23T21:27:59Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1756'] | Dragonfly Code Injection vulnerability | The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'fixed': '0.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '0.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103538/http://www.securityfocus.com/bid/58225'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r8fh-hq2p-7qhq | 2023-03-14T22:03:04Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3483'] | Active Record contains SQL Injection via improper range quoting | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3483.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228150648/http://www.securityfocus.com/bid/68341'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0877.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j838-vfpq-fmf2 | 2023-01-23T17:47:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1857'] | actionpack Cross-site Scripting vulnerability | The sanitize helper in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded `:` (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a `:` sequence. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0698.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-85r7-w5mv-c849 | 2023-08-25T23:30:15Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0262'] | Rack Vulnerable to Path Traversal | `rack/file.rb` (`Rack::File`) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted `PATH_INFO` environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909071'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909072'}, {'type': 'WEB', 'url': 'https://gist.github.com/rentzsch/4736940'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0262.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:29Z', 'nvd_published_at': '2013-02-08T20:55:00Z'} |
1.4.0 | GHSA-wcm2-9c89-wmfm | 2023-02-09T19:24:11Z | 2017-10-24T18:33:38Z | null | ['CVE-2010-5312'] | Cross-site Scripting in jquery-ui | Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2010-5312.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150316023043/http://www.securityfocus.com/bid/71106'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170316161850/http://www.securitytracker.com/id/1037035'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/6016'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3249'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:08Z', 'nvd_published_at': '2014-11-24T16:59:00Z'} |
1.4.0 | GHSA-99ch-8mvp-g7m5 | 2023-01-23T16:37:19Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1948'] | md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename | `converter.rb` in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'md2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/md2pdf/CVE-2013-1948.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rwestgeest/md2pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130503194109/http://www.securityfocus.com/bid/59061'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/md2pdf-remote-exec.html'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hjcp-j389-59ff | 2021-09-14T17:23:54Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8854'] | Regular Expression Denial of Service in marked | Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule.
## Recommendation
Update to version 0.3.4 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/497'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjcp-j389-59ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/chjj/marked'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/23'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvcj-pfq2-wxj7 | 2021-09-13T12:46:47Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-1202'] | High severity vulnerability that affects electron | Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/2976'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN00324715/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054'}] | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c43v-hrmg-56r4 | 2023-09-05T21:12:28Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4457'] | Cocaine Gem OS Command Injection vulnerability | The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocaine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/cocaine'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/10/22/10'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2xjj-5x6h-8vmf | 2023-08-25T20:14:16Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-1099'] | Cross-site Scripting in actionpack | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_options_helper.rb` in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799276'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-1099.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2466'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w3w8-37jv-2c58 | 2021-09-20T22:34:08Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8862'] | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommendation
Update to version 2.2.1 or later.
Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862'}, {'type': 'WEB', 'url': 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3w8-37jv-2c58'}, {'type': 'PACKAGE', 'url': 'https://github.com/janl/mustache.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/62'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2016-18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96436'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hpcf-8vf9-q4gj | 2023-01-26T23:02:07Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-7103'] | jQuery-UI vulnerable to Cross-site Scripting in dialog closeText | Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function.
jQuery-UI is a library for manipulating UI elements via jQuery.
Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector.
## Recommendation
Upgrade to jQuery-UI 1.12.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'WEB', 'url': 'https://github.com/jquery/api.jqueryui.com/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1622'}, {'type': 'WEB', 'url': 'https://github.com/jquery-ui-rails/jquery-ui-rails/commit/d504a40538fe5f7998439ad2f8fc5c4a1f843f1c'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2016-7103.yml'}, {'type': 'WEB', 'url': 'https://jqueryui.com/changelog/1.12.0/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030100/http://www.securityfocus.com/bid/104823'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2932.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2933.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0161.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:44Z', 'nvd_published_at': '2017-03-15T16:59:00Z'} |
1.4.0 | GHSA-24fg-p96v-hxh8 | 2023-05-26T17:41:44Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0447'] | actionpack Cross-Site Request Forgery vulnerability | Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/66ce3843d32e9f2ac3b1da20067af53019bbb034'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/7e86f9b4d2b7dfa974c10ae7e6d8ef90f3d77f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0447.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170223045008/http://www.securitytracker.com/id?1025060'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgmw-x865-hf9x | 2023-01-26T20:58:07Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-2322'] | Arabic Prawn allows remote attackers to execute arbitrary commands via shell metacharacters | `lib/string_utf_support.rb` in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'Arabic-Prawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/ozeron/prawn-arabic'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/12/6'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxvw-45rp-3mj2 | 2021-09-22T18:27:56Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4660'] | Deserialization Code Execution in js-yaml | Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer.
## Proof of Concept
```
const yaml = require('js-yaml');
const x = `test: !!js/function >
function f() {
console.log(1);
}();`
yaml.load(x);
```
## Recommendation
Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead. | [] | [{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/16'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:05:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g89m-3wjw-h857 | 2023-05-12T17:09:48Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3865'] | Puppet vulnerable to Path Traversal | Directory traversal vulnerability in `lib/puppet/reports/store.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a `..` (dot dot) in a node name. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839131'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/overview-cve-2012-3865-arbitrary-file-delete/dos-puppet-master'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3865/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5j3g-jfq3-7jwx | 2021-09-01T22:16:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7205'] | Arbitrary JavaScript Execution in bassmaster | A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval.
## Recommendation
Update to bassmaster version 1.5.2 or greater. | [] | [{'package': {'ecosystem': 'npm', 'name': 'bassmaster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7205'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j3g-jfq3-7jwx'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/bassmaster'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40689/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70180'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q44r-f2hm-v76v | 2023-05-12T17:21:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3867'] | Pupper does not properly restrict characters in Common Name field of Certificate Signing Request | `lib/puppet/ssl/certificate_authority.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839158'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3867.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3867-insufficient-input-validation'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3867/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h5q-96hp-9jgm | 2023-08-25T18:48:39Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6415'] | actionpack vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in the `number_to_currency` helper in `actionpack/lib/action_view/helpers/number_helper.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6415.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6415'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131206180005/http://www.securityfocus.com/bid/64077'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h36-4jf2-hx53 | 2023-01-23T20:56:41Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1802'] | extlib does not properly restrict casts of string values | The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'extlib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917233'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/extlib'}, {'type': 'WEB', 'url': 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/extlib/CVE-2013-1802.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html'}] | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r7q2-5gqg-6c7q | 2023-05-12T17:22:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-2929'] | actionpack Improper Input Validation vulnerability | The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2929.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rprj-g6xc-p5gq | 2023-07-04T00:25:07Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4413'] | Wicked gem contains Path traversal vulnerability | The Wicked gem prior to v1.0.1 allows a remote attacker to traverse directories on the system via a vulnerability in `controller/concerns/render_redirect.rb`. An attacker can send a specially-crafted URL request containing `%2E%2E%2F` directory traversal sequences to read arbitrary files on the system. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'wicked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'}, {'type': 'WEB', 'url': 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/wicked/CVE-2013-4413.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schneems/wicked'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210508170740/http://www.securityfocus.com/bid/62891'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/43'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cj43-9h3w-v976 | 2022-10-04T21:44:45Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4761'] | Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service | Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.23'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-4761-resourcetype-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2013-4761/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2761'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w248-xr37-jx8m | 2023-08-28T13:51:43Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2615'] | fastreader Gem for Ruby URI Handling Arbitrary Command Injection | fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fastreader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fastreader/CVE-2013-2615.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/122'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4ww3-3rxj-8v6q | 2023-05-12T15:23:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0449'] | actionpack allows remote attackers to bypass intended access restrictions | `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6f80224057803f85b3f448936aae89e742452c3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionpack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0449.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207190612/http://securitytracker.com/id?1025061'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-34r7-q49f-h37c | 2021-10-29T14:15:03Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8857'] | Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js | Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification.
## Recommendation
Upgrade UglifyJS to version >= 2.4.24. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.24'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uglifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}, {'type': 'WEB', 'url': 'https://github.com/mishoo/UglifyJS2/issues/751'}, {'type': 'WEB', 'url': 'https://github.com/lautis/uglifier/commit/4677bfe38142937ff952f95605bcec4618892c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mishoo/UglifyJS2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uglifier/CVE-2015-8857.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190830/http://www.securityfocus.com/bid/96410'}, {'type': 'WEB', 'url': 'https://zyan.scripts.mit.edu/blog/backdooring-js/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-1254', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:00Z', 'nvd_published_at': '2017-01-23T21:59:00Z'} |
1.4.0 | GHSA-wpw7-wxjm-cw8r | 2023-08-25T19:25:00Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6417'] | actionpack allows bypass of database-query restrictions | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806051251/https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0469.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:55Z', 'nvd_published_at': '2013-12-07T00:55:00Z'} |
1.4.0 | GHSA-cqr7-78pj-3g7j | 2021-09-09T20:31:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3742'] | File Descriptor Leak Can Cause DoS Vulnerability in hapi | Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak.
When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified.
## Recommendation
- Please upgrade to version 2.2.x or above as soon as possible. | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/issues/1427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3crr-9vmg-864v | 2023-08-25T23:15:31Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1854'] | Active Record Improper Input Validation | The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0699'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=921329'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-1854.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0699.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:54Z', 'nvd_published_at': '2013-03-19T22:55:00Z'} |
1.4.0 | GHSA-p673-hjf2-pwfr | 2023-07-03T23:38:02Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1875'] | Shell command injection in command_wrap | command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'command_wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/command_wrap/CVE-2013-1875.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/slicertje/commandwrap'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/175'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q86f-fmqf-qrf6 | 2023-09-05T21:08:32Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-9097'] | Mail Gem CRLF Injection vulnerability | The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/215'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/pull/1097'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/137631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q86f-fmqf-qrf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/mail-OSVDB-131677'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/12/11/3'}, {'type': 'WEB', 'url': 'http://www.mbsd.jp/Whitepaper/smtpi.pdf'}] | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mhwp-qhpc-h3jm | 2023-03-14T20:49:26Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3482'] | SQL Injection in Active Record | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0876.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7fq-cf8q-35q7 | 2023-01-23T21:21:34Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1800'] | crack does not properly restrict casts of string values | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'crack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=804721'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/crack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/crack/CVE-2013-1800.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html'}] | {'cwe_ids': ['CWE-704', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-959j-5g9v-3fpq | 2023-08-25T22:59:09Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-1234'] | Paratrooper-newrelic Exposes of Sensitive Information to an Unauthorized Actor | The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-newrelic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-newrelic/CVE-2014-1234.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/2'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33pp-3763-mrfp | 2023-03-01T18:54:54Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7819'] | sprockets vulnerable to Path Traversal | Multiple directory traversal vulnerabilities in `server.rb` in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1161527'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:55Z', 'nvd_published_at': '2014-11-08T11:55:00Z'} |
1.4.0 | GHSA-4whc-pp4x-9pf3 | 2023-01-20T22:28:49Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-1840'] | jquery-rails and jquery-ujs subject to Exposure of Sensitive Information | jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ujs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/jquery-rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ujs/CVE-2015-1840.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084945/http://www.securityfocus.com/bid/75239'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/15'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxp4-25qp-86qh | 2020-06-17T15:15:14Z | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z | [] | Moderate severity vulnerability that affects ember | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxp4-25qp-86qh'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghqm-pgxj-37gq | 2023-01-23T21:16:04Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7580'] | rails-html-sanitizer Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `lib/rails/html/scrubbers.rb` in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/15'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-75w6-p6mg-vh8j | 2023-05-26T16:09:49Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0446'] | Rails actionpack gem vulnerable to Cross-site Scripting | Multiple cross-site scripting (XSS) vulnerabilities in the `mail_to` helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/abe97736b8316f1b714cac56c115c0779aa73217'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e3dd2107c57a8efaaea5d61cf8da65f7444760b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812054342/http://www.securitytracker.com/id?1025064'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q5pq-pgrv-fh89 | 2023-09-05T23:30:40Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-9682'] | dns-sync command injection vulnerability | The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function. | [] | [{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89'}, {'type': 'PACKAGE', 'url': 'https://github.com/skoranga/node-dns-sync'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/11/11/6'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-699m-mcjm-9cw8 | 2023-08-25T19:05:47Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4491'] | actionpack vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-699m-mcjm-9cw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-4491.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3m6r-39p3-jq25 | 2022-04-25T16:34:57Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6582'] | Doorkeeper is vulnerable to replay attacks | The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2016-6582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214021758/http://www.securityfocus.com/bid/92551'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207202519/http://www.securityfocus.com/archive/1/539268/100/0/threaded'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Aug/105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/19/2'}] | {'cwe_ids': ['CWE-1254'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q34c-48gc-m9g8 | 2023-05-12T17:20:28Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2694'] | actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2694.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xwg4-93c6-3h42 | 2021-09-22T17:58:56Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-6394'] | Directory Traversal in send | Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.
For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`.
## Recommendation
Update to version 0.8.4 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwg4-93c6-3h42'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/send'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT205217'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/32'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/24/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70100'}] | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rg5m-3fqp-6px8 | 2023-07-04T00:18:31Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-4389'] | actionmailer email address processing causes Denial of service | Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4389'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionmailer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2887'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}] | {'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-229r-pqp6-8w6g | 2023-08-29T15:58:19Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-6421'] | sprout Arbitrary Code Execution vulnerability | The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprout'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.7.246']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6421'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukebayes/project-sprouts'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sprout/CVE-2013-6421.yml'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/6'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4936-rj25-6wm6 | 2023-01-20T22:08:42Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0285'] | nori contains Improper Input Validation | The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/2ca6f8603e406f884a8fcea6bc26f8f6bf168f40'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/4bcf59abdcec6bcd1153241b122eda61a494e4fb'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/818f5263b1d597b603d46cbe1702cd2717259e32'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c3fdce7a2d2670b44f1cda35da0ae73cc1372084'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c5e07f5c32e615f0a4a7ee2782d37f7a33261be4'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/d9b68667249b98776fb23ba9e9c548dc4b524709'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4936-rj25-6wm6'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nori/CVE-2013-0285.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/savonrb/nori'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9959-c6q6-6qp3 | 2020-06-17T16:30:41Z | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z | [] | Moderate severity vulnerability that affects validator | **Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q | [] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9959-c6q6-6qp3'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rgr4-9jh5-j4j6 | 2023-03-14T21:47:07Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3225'] | Rack vulnerable to Denial of Service via large parameter depth request | lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/HISTORY.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/14'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2290.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3322'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rp63-jfmw-532w | 2023-09-05T22:04:31Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2140'] | Mail Gem Improper Input Validation vulnerability | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-333x-9vgq-v2j4 | 2021-08-31T20:33:50Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-5688'] | Directory Traversal in geddy | Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8 | [] | [{'package': {'ecosystem': 'npm', 'name': 'geddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/issues/697'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/pull/699'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333x-9vgq-v2j4'}, {'type': 'PACKAGE', 'url': 'https://github.com/geddy/geddy'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/releases/tag/v13.0.8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/10'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jgqf-hwc5-hh37 | 2021-09-14T19:42:25Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8859'] | Root Path Disclosure in send | Versions of `send` prior to 0.11.2 are affected by an information leakage vulnerability which may allow an attacker to enumerate paths on the server filesystem.
## Recommendation
Update to version 0.11.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8859'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/pull/70'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/commit/98a5b89982b38e79db684177cf94730ce7fc7aed'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillarjs/send'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227192016/https://www.securityfocus.com/bid/96435/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fgmx-8h93-26fh | 2023-01-25T23:20:49Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6134'] | omniauth-oauth2 Cross-Site Request Forgery vulnerability | Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem prior to 1.1.1 for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/intridea/omniauth-oauth2/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-oauth2/CVE-2012-6134.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170312020947/https://gist.github.com/homakov/3673012'}, {'type': 'WEB', 'url': 'http://rubysec.github.io/advisories/CVE-2012-6134/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fg9w-g6m4-557j | 2023-05-26T17:12:19Z | 2017-10-24T18:33:38Z | null | ['CVE-2009-3086'] | actionpack and activesupport vulnerable to information leaks | A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d460c9a25560f43e7c3789abadf7b455053eb686'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/http://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090907001716/http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229150042/http://www.securityfocus.com/bid/37427'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pr3r-4wrp-r2pv | 2023-07-04T00:01:26Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6317'] | ActiveRecord in Ruby on Rails allows database-query bypass | Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/4'}] | {'cwe_ids': ['CWE-284', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qv8p-v9qw-wc7g | 2023-01-23T18:01:41Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-1098'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799275'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f522-ffg8-j8r6 | 2021-09-09T21:38:37Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-2537'] | Regular Expression Denial of Service in is-my-json-valid | Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317548'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f522-ffg8-j8r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mafintosh/is-my-json-valid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/572'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/76'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c9f4-xj24-8jqx | 2021-09-08T21:59:09Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8858'] | Regular Expression Denial of Service in uglify-js | Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method.
### Proof of Concept
```
var u = require('uglify-js');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;");
```
### Results
```
$ time node test.js 10000
real 0m1.091s
user 0m1.047s
sys 0m0.039s
$ time node test.js 80000
real 0m6.486s
user 0m6.229s
sys 0m0.094s
```
## Recommendation
Update to version 2.6.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/48'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96409'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6f7-46hw-grcj | 2023-03-14T20:44:40Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2090'] | Creme Fraiche contains OS Command Injection | The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cremefraiche'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-67j6-xv27-w6ww | 2023-03-14T23:11:59Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-3224'] | Web Console (Ruby gem) contains whitelisted_ips bypass | request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/web-console'}, {'type': 'WEB', 'url': 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/web-console/CVE-2015-3224.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/18'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x6fg-f45m-jf5q | 2021-09-21T22:15:35Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-8855'] | Regular Expression Denial of Service in semver | Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Recommendation
Update to version 4.3.2 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/31'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/86957'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r23g-3qw4-gfh2 | 2023-08-28T19:55:45Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6684'] | RedCloth Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a `javascript:` URI. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684'}, {'type': 'WEB', 'url': 'https://co3k.org/blog/redcloth-unfixed-xss-en'}, {'type': 'WEB', 'url': 'https://gist.github.com/co3k/75b3cb416c342aa1414c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/RedCloth/CVE-2012-6684.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/50'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3168'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rh6c-q938-3r9q | 2021-09-17T18:17:08Z | 2017-10-24T18:33:36Z | null | ['CVE-2013-7452'] | Moderate severity vulnerability that affects validator | The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxx6-p24v-wg8c | 2023-08-29T10:57:50Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2617'] | Curl Gem insufficient URL escaping command injection | `lib/curl.rb` in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'curl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2617'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curl/CVE-2013-2617.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tggo/curl'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gcqq-w6gr-h9j9 | 2023-01-26T20:55:34Z | 2017-10-24T18:33:35Z | null | ['CVE-2017-5946'] | Directory traversal vulnerability in RubyZip | The `Zip::File` component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses `../` pathname substrings to write arbitrary files to the filesystem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/315'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2017-5946.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/releases'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227185727/http://www.securityfocus.com/bid/96445'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3801'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p4c6-77gc-694x | 2023-05-11T13:54:28Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-6077'] | session fixation protection mechanism in cgi_process.rb in Rails | The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p4c6-77gc-694x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-6077.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/changeset/8177'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/10048'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27781'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26598'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4009'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}] | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7p5-w2cr-7cp7 | 2023-05-12T17:27:38Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-3567'] | Puppet Improper Input Validation vulnerability | Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.22'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-3567/'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2715'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1886-1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pc3m-v286-2jwj | 2023-01-23T17:59:42Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-6316'] | actionview Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.0.1'}]}], 'versions': ['5.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1856.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1857.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1858.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3651'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h88-qjpv-p32m | 2022-04-25T16:33:57Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-7798'] | OpenSSL gem for Ruby using inadequate encryption strength | The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/49'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h88-qjpv-p32m'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/openssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openssl/CVE-2016-7798.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210121065227/https://www.securityfocus.com/bid/93031/info'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2017/dsa-3966'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/19/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/30/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/10/01/2'}] | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gm25-fpmr-43fj | 2023-05-11T13:41:22Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-3227'] | Moderate severity vulnerability that affects rails | Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm25-fpmr-43fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-3227.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8371'}, {'type': 'WEB', 'url': 'http://osvdb.org/36378'}, {'type': 'WEB', 'url': 'http://pastie.caboo.se/65550.txt'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/25699'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27756'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_24_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/24161'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/2216'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cpjc-p7fc-j9xh | 2023-01-23T21:15:08Z | 2017-10-24T18:33:38Z | null | ['CVE-2011-0739'] | Mail Improper Input Validation vulnerability | The deliver function in the sendmail delivery agent (`lib/mail/network/delivery_methods/sendmail.rb`) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0739'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h56m-vwxc-3qpw | 2023-08-25T19:56:49Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7829'] | Directory traversal vulnerability in actionpack | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h56m-vwxc-3qpw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7829.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rMTQy4oRCGk'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160403085126/http://www.securityfocus.com/bid/71183'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:46Z', 'nvd_published_at': '2014-11-18T23:59:00Z'} |
1.4.0 | GHSA-98mf-8f57-64qf | 2023-01-23T16:34:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3463'] | actionpack Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_tag_helper.rb` in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the `prompt` field to the `select_tag` helper. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6d0526db91afb0675c2ad3d871529d1536303c64'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/fV3QUToSMSw/m/eHBSFOUYHpYJ?pli=1'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p692-7mm3-3fxg | 2023-07-31T20:59:11Z | 2017-10-24T18:33:36Z | null | ['CVE-2015-7576'] | actionpack is vulnerable to remote bypass authentication | The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/17e6f1507b7f2c2a883c180f4f9548445d6dfbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7576.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81803'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/8'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-92v7-pq4h-58j5 | 2023-06-07T14:06:11Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-3248'] | facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability | Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) `rubygems/defaults/operating_system.rb`, (2) `Win32API.rb`, (3) `Win32API.so`, (4) `safe_yaml.rb`, (5) `safe_yaml/deep.rb`, or (6) `safe_yaml/deep.so`; or (7) `operatingsystem.rb`, (8) `operatingsystem.so`, (9) `osfamily.rb`, or (10) `osfamily.so` in `puppet/confine`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'hiera'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.26'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mcollective-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/facter/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hiera/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mcollective-client/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20141129061319/http://www.securityfocus.com/bid/68035'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150204183209/http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150907182402/http://puppetlabs.com/security/cve/cve-2014-3248'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:08Z', 'nvd_published_at': '2014-11-16T17:59:00Z'} |
1.4.0 | GHSA-hgpp-pp89-4fgf | 2023-08-25T23:26:17Z | 2017-10-24T18:33:38Z | null | ['CVE-2012-2660'] | Action Pack contains database-query restrictions bypass | `actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `[nil]` values, a related issue to CVE-2012-2694. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8SA-M3as7A8/m/Mr9fi9X4kNgJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-29gr-w57f-rpfw | 2023-08-25T19:41:02Z | 2017-10-24T18:33:36Z | null | ['CVE-2014-7818'] | actionpack vulnerable to Path Traversal | Directory traversal vulnerability in `actionpack/lib/action_dispatch/middleware/static.rb` in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when `serve_static_assets` is enabled, allows remote attackers to determine the existence of files outside the application root via a `/..%2F` sequence. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gr-w57f-rpfw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7818.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dCp7duBiQgo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:48Z', 'nvd_published_at': '2014-11-08T11:55:00Z'} |
1.4.0 | GHSA-xgr2-v94m-rc9g | 2023-08-25T20:10:51Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-0333'] | activesupport in Rails vulnerable to incorrect data conversion | `lib/active_support/json/backends/yaml.rb` in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.2'}, {'fixed': '2.3.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0202'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0203'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=903440'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-0333.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0333'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0201.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0202.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0203.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2613'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:24Z', 'nvd_published_at': '2013-01-30T12:00:00Z'} |
1.4.0 | GHSA-9hx9-w2j6-rw76 | 2023-07-05T18:52:49Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-2105'] | Script Injection in Show In Browser gem | The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on `/tmp/browser.html`. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'show_in_browser'}, 'versions': ['0.0.3']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/show_in_browser/CVE-2013-2105.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/show_in_browser.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/05/18/4'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7fqj-cg79-f2pv | 2023-08-28T13:54:43Z | 2017-10-24T18:33:37Z | null | ['CVE-2013-1898'] | Thumbshooter vulnerable to Code Injection | lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'thumbshooter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898'}, {'type': 'PACKAGE', 'url': 'https://github.com/digineo/thumbshooter'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thumbshooter/CVE-2013-1898.yml'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/218'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/3'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5hj-fhc9-g24m | 2023-01-23T21:18:15Z | 2017-10-24T18:33:35Z | null | ['CVE-2016-4442'] | rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects | The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'}, {'type': 'PACKAGE', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/10/2'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h835-75hw-pj89 | 2023-01-23T17:34:24Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-3464'] | activesupport Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.rb` in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/7215'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/28f2c6f4037081da0a82104a3f473165ed4ed2ce'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/780a718723cf87b49cfe204d355948c4e0932d23'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d0c9759d3aeb6327d68dd6c0de0fe2fed4e3c870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h835-75hw-pj89'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2012-3464.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/50694'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gh2w-j7cx-2664 | 2023-03-14T19:07:57Z | 2017-10-24T18:33:37Z | null | ['CVE-2012-6496'] | Active Record contains SQL Injection | SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=889649'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0220.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201401-22.xml'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9wrq-xvmp-xjc8 | 2021-12-01T19:40:37Z | 2017-10-24T18:33:38Z | null | ['CVE-2006-4112'] | High severity vulnerability that affects rails. | Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4112.yml'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21424'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/699540'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/442934/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jwhv-rgqc-fqj5 | 2023-05-11T13:50:52Z | 2017-10-24T18:33:38Z | null | ['CVE-2007-5380'] | Session fixation vulnerability in Rails | Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions." | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5380.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27965'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_25_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxhj-hp9m-qwc4 | 2023-01-23T17:38:44Z | 2017-11-29T23:21:05Z | null | ['CVE-2017-0904'] | private_address_check vulnerable to bypass of Resolv.getaddresses method | The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's `Resolv.getaddresses` method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287245'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287835'}, {'type': 'WEB', 'url': 'https://edoverflow.com/2017/ruby-resolv-bug/'}] | {'cwe_ids': ['CWE-242'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x7p2-x2j6-mwhr | 2023-08-29T12:26:53Z | 2017-11-29T23:19:51Z | null | ['CVE-2017-16833'] | Gemirro Stored XSS in Gemspec "homepage" value | Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file.
A ".gemspec" file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload to the Gemirro server, in order to achieve stored XSS via the author name hyperlink. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gemirro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}, {'type': 'WEB', 'url': 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}, {'type': 'PACKAGE', 'url': 'https://github.com/PierreRambaud/gemirro'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gemirro/CVE-2017-16833.yml'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7qcx-jmrc-h2rr | 2021-09-03T21:41:16Z | 2017-11-15T19:44:16Z | null | ['CVE-2017-15878'] | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.
## Recommendation
Update to version 4.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43054/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/980'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rph7-j9qr-h8q8 | 2021-09-17T19:23:32Z | 2017-11-28T22:20:17Z | null | ['CVE-2013-7377'] | Potential Command Injection in codem-transcode | When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.
### Mitigating Factors:
The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default.
## Recommendation
An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade.. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'codem-transcode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hwcf-pp87-7x6p | 2023-09-08T21:35:56Z | 2017-11-30T23:15:05Z | null | ['CVE-2017-1000188'] | mde ejs vulnerable to XSS | nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the `ejs.renderFile()` resulting in code injection | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ejs'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227134555/http://www.securityfocus.com/bid/101889'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5c8j-xr24-2665 | 2021-09-01T21:34:20Z | 2017-11-28T22:44:52Z | null | ['CVE-2014-3741'] | Potential Command Injection in printer | Versions 0.0.1 and earlier of `printer` are affected by a command injection vulnerability resulting from a failure to sanitize command arguments properly in the `printDirect()` function.
## Recommendation
Update to version 0.0.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'printer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3741'}, {'type': 'WEB', 'url': 'https://github.com/tojocky/node-printer/commit/e001e38738c17219a1d9dd8c31f7d82b9c0013c7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8j-xr24-2665'}, {'type': 'PACKAGE', 'url': 'https://github.com/tojocky/node-printer'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/27'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pjj4-w39g-pw54 | 2023-01-26T21:23:13Z | 2017-11-21T18:26:40Z | null | ['CVE-2017-15928'] | Ox gem crashes due to a crafted input | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to `parse_obj`. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-15928.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/ox/versions/2.8.0'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q43c-g2g7-6gxj | 2021-06-10T21:18:39Z | 2017-11-30T23:14:47Z | null | ['CVE-2017-16570'] | Cross-Site Request Forgery (CSRF) in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints.
## Recommendation
Update to version 4.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43922/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/979'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:45Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.