schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
4 values
aliases
stringlengths
2
20
summary
stringlengths
24
115
details
stringlengths
47
1.85k
severity
stringclasses
24 values
affected
stringlengths
90
2.44k
references
stringlengths
161
4.51k
database_specific
stringlengths
131
175
1.4.0
GHSA-wwmf-6p58-6vj2
2023-06-12T16:42:56Z
2017-10-24T18:33:38Z
null
['CVE-2006-2582']
Remote code execution in rwiki
The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0pre1'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rwiki/CVE-2006-2582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/20264'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/1949'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:28Z', 'nvd_published_at': None}
1.4.0
GHSA-ffpv-c4hm-3x6v
2023-07-31T21:08:45Z
2017-10-24T18:33:35Z
null
['CVE-2016-0751']
actionpack is vulnerable to denial of service via a crafted HTTP Accept header
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/127967b735813cd4f263df7a50426d74e7e9cc17'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/221937c8ba1d291430ceddebbd4bdef7d3cb47d6'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/37047b779a177b911c7161052cfc34a30e1db0af'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0751.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128201702/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227181647/http://www.securityfocus.com/bid/81800'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/9'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:31Z', 'nvd_published_at': None}
1.4.0
GHSA-6x85-j5j2-27jx
2023-02-15T22:22:18Z
2017-10-24T18:33:36Z
null
['CVE-2014-0130']
actionpack Path Traversal vulnerability
Directory traversal vulnerability in `actionpack/lib/abstract_controller/base.rb` in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0510'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0816'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-0130'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1095105'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0130.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/NkKc7vTW70o'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140518192004/http://www.securityfocus.com/bid/67244'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150319054505/http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210411041816/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:36Z', 'nvd_published_at': '2014-05-07T10:55:00Z'}
1.4.0
GHSA-9c2j-593q-3g82
2023-06-01T19:51:36Z
2017-10-24T18:33:37Z
null
['CVE-2013-1856']
activesupport Improper Input Validation vulnerability
The `ActiveSupport::XmlMini_JDOM` backend in `lib/active_support/xml_mini/jdom.rb` in the Active Support component in Ruby on Rails 3.0.x and 3.1.x before 3.1.12 and 3.2.x before 3.2.13, when JRuby is used, does not properly restrict the capabilities of the XML parser, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving (1) an external DTD or (2) an external entity declaration in conjunction with an entity reference.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1856'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-1856.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/6c2482d4ed1545e6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:09Z', 'nvd_published_at': None}
1.4.0
GHSA-x457-cw4h-hq5f
2023-06-01T19:55:21Z
2017-10-24T18:33:37Z
null
['CVE-2013-0269']
JSON gem has Improper Input Validation vulnerability
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/CVE-2013-0269.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130228082541/http://www.securityfocus.com/bid/57899'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160331131233/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808163226/https://puppet.com/security/cve/cve-2013-0269'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1028.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1147.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/8'}, {'type': 'WEB', 'url': 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}, {'type': 'WEB', 'url': 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:58Z', 'nvd_published_at': None}
1.4.0
GHSA-9rf5-jm6f-2fmm
2023-08-25T22:56:38Z
2017-10-24T18:33:36Z
null
['CVE-2014-3514']
Active Record subject to strong parameters protection bypass
`activerecord/lib/active_record/relation/query_methods.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes `create_with` calls.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3514.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/08/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1102.html'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:34Z', 'nvd_published_at': None}
1.4.0
GHSA-v5jg-558j-q67c
2023-05-12T17:23:04Z
2017-10-24T18:33:38Z
null
['CVE-2011-2931']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the `strip_tags` helper in `actionpack/lib/action_controller/vendor/html-scanner/html/node.rb` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731436'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5jg-558j-q67c'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2931.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:49Z', 'nvd_published_at': None}
1.4.0
GHSA-p463-639r-q9g9
2023-01-23T21:27:59Z
2017-10-24T18:33:37Z
null
['CVE-2013-1756']
Dragonfly Code Injection vulnerability
The Dragonfly gem 0.7 before 0.8.6 and 0.9.x before 0.9.13 for Ruby, when used with Ruby on Rails, allows remote attackers to execute arbitrary code via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'fixed': '0.8.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9'}, {'fixed': '0.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1756'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/commit/a8775aacf9e5c81cf11bec34b7afa7f27ddfe277'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82476'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/dragonfly-users/3c3WIU3VQTo'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103538/http://www.securityfocus.com/bid/58225'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:55Z', 'nvd_published_at': None}
1.4.0
GHSA-r8fh-hq2p-7qhq
2023-03-14T22:03:04Z
2017-10-24T18:33:36Z
null
['CVE-2014-3483']
Active Record contains SQL Injection via improper range quoting
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3483'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-3483.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228150648/http://www.securityfocus.com/bid/68341'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0877.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:02Z', 'nvd_published_at': None}
1.4.0
GHSA-j838-vfpq-fmf2
2023-01-23T17:47:24Z
2017-10-24T18:33:37Z
null
['CVE-2013-1857']
actionpack Cross-site Scripting vulnerability
The sanitize helper in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded `:` (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a `&#x3a;` sequence.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1857'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0698.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:30Z', 'nvd_published_at': None}
1.4.0
GHSA-85r7-w5mv-c849
2023-08-25T23:30:15Z
2017-10-24T18:33:37Z
null
['CVE-2013-0262']
Rack Vulnerable to Path Traversal
`rack/file.rb` (`Rack::File`) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted `PATH_INFO` environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909071'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=909072'}, {'type': 'WEB', 'url': 'https://gist.github.com/rentzsch/4736940'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0262.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:29Z', 'nvd_published_at': '2013-02-08T20:55:00Z'}
1.4.0
GHSA-wcm2-9c89-wmfm
2023-02-09T19:24:11Z
2017-10-24T18:33:38Z
null
['CVE-2010-5312']
Cross-site Scripting in jquery-ui
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98696'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2010-5312.yml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150316023043/http://www.securityfocus.com/bid/71106'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170316161850/http://www.securitytracker.com/id/1037035'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/6016'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3249'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:08Z', 'nvd_published_at': '2014-11-24T16:59:00Z'}
1.4.0
GHSA-99ch-8mvp-g7m5
2023-01-23T16:37:19Z
2017-10-24T18:33:37Z
null
['CVE-2013-1948']
md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename
`converter.rb` in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'md2pdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/md2pdf/CVE-2013-1948.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rwestgeest/md2pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130503194109/http://www.securityfocus.com/bid/59061'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/md2pdf-remote-exec.html'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:02Z', 'nvd_published_at': None}
1.4.0
GHSA-hjcp-j389-59ff
2021-09-14T17:23:54Z
2017-10-24T18:33:36Z
null
['CVE-2015-8854']
Regular Expression Denial of Service in marked
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule. ## Recommendation Update to version 0.3.4 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/497'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjcp-j389-59ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/chjj/marked'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&amp;utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/23'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:28Z', 'nvd_published_at': None}
1.4.0
GHSA-gvcj-pfq2-wxj7
2021-09-13T12:46:47Z
2017-10-24T18:33:35Z
null
['CVE-2016-1202']
High severity vulnerability that affects electron
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/2976'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN00324715/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054'}]
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:05Z', 'nvd_published_at': None}
1.4.0
GHSA-c43v-hrmg-56r4
2023-09-05T21:12:28Z
2017-10-24T18:33:37Z
null
['CVE-2013-4457']
Cocaine Gem OS Command Injection vulnerability
The Cocaine gem 0.4.0 through 0.5.2 for Ruby allows context-dependent attackers to execute arbitrary commands via a crafted has object, related to recursive variable interpolation.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cocaine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4457'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/cocaine'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/cocaine/blob/master/NEWS.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/10/22/10'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:11Z', 'nvd_published_at': None}
1.4.0
GHSA-2xjj-5x6h-8vmf
2023-08-25T20:14:16Z
2017-10-24T18:33:38Z
null
['CVE-2012-1099']
Cross-site Scripting in actionpack
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_options_helper.rb` in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799276'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-1099.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2466'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:21Z', 'nvd_published_at': None}
1.4.0
GHSA-w3w8-37jv-2c58
2021-09-20T22:34:08Z
2017-10-24T18:33:36Z
null
['CVE-2015-8862']
Cross-Site Scripting in mustache
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted. ### Example Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 2.2.1 or later. Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862'}, {'type': 'WEB', 'url': 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w3w8-37jv-2c58'}, {'type': 'PACKAGE', 'url': 'https://github.com/janl/mustache.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/62'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2016-18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96436'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:24Z', 'nvd_published_at': None}
1.4.0
GHSA-hpcf-8vf9-q4gj
2023-01-26T23:02:07Z
2017-10-24T18:33:35Z
null
['CVE-2016-7103']
jQuery-UI vulnerable to Cross-site Scripting in dialog closeText
Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function. jQuery-UI is a library for manipulating UI elements via jQuery. Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector. ## Recommendation Upgrade to jQuery-UI 1.12.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103'}, {'type': 'WEB', 'url': 'https://github.com/jquery/api.jqueryui.com/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1622'}, {'type': 'WEB', 'url': 'https://github.com/jquery-ui-rails/jquery-ui-rails/commit/d504a40538fe5f7998439ad2f8fc5c4a1f843f1c'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2016-7103.yml'}, {'type': 'WEB', 'url': 'https://jqueryui.com/changelog/1.12.0/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6%40%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8%40%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0007/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030100/http://www.securityfocus.com/bid/104823'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2932.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-2933.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2017-0161.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:44Z', 'nvd_published_at': '2017-03-15T16:59:00Z'}
1.4.0
GHSA-24fg-p96v-hxh8
2023-05-26T17:41:44Z
2017-10-24T18:33:38Z
null
['CVE-2011-0447']
actionpack Cross-Site Request Forgery vulnerability
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0447'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/66ce3843d32e9f2ac3b1da20067af53019bbb034'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/7e86f9b4d2b7dfa974c10ae7e6d8ef90f3d77f06'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0447.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170223045008/http://www.securitytracker.com/id?1025060'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:22Z', 'nvd_published_at': None}
1.4.0
GHSA-hgmw-x865-hf9x
2023-01-26T20:58:07Z
2017-10-24T18:33:36Z
null
['CVE-2014-2322']
Arabic Prawn allows remote attackers to execute arbitrary commands via shell metacharacters
`lib/string_utf_support.rb` in the Arabic Prawn 0.0.1 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) downloaded_file or (2) url variable.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'Arabic-Prawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/ozeron/prawn-arabic'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/10/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/12/6'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:12Z', 'nvd_published_at': None}
1.4.0
GHSA-xxvw-45rp-3mj2
2021-09-22T18:27:56Z
2017-10-24T18:33:37Z
null
['CVE-2013-4660']
Deserialization Code Execution in js-yaml
Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer. ## Proof of Concept ``` const yaml = require('js-yaml'); const x = `test: !!js/function > function f() { console.log(1); }();` yaml.load(x); ``` ## Recommendation Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead.
[]
[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/16'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:05:02Z', 'nvd_published_at': None}
1.4.0
GHSA-g89m-3wjw-h857
2023-05-12T17:09:48Z
2017-10-24T18:33:37Z
null
['CVE-2012-3865']
Puppet vulnerable to Path Traversal
Directory traversal vulnerability in `lib/puppet/reports/store.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a `..` (dot dot) in a node name.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839131'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3865.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/overview-cve-2012-3865-arbitrary-file-delete/dos-puppet-master'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3865/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:27Z', 'nvd_published_at': None}
1.4.0
GHSA-5j3g-jfq3-7jwx
2021-09-01T22:16:02Z
2017-10-24T18:33:36Z
null
['CVE-2014-7205']
Arbitrary JavaScript Execution in bassmaster
A vulnerability exists in bassmaster <= 1.5.1 that allows for an attacker to provide arbitrary JavaScript that is then executed server side via eval. ## Recommendation Update to bassmaster version 1.5.2 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'bassmaster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7205'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/bassmaster/commit/b751602d8cb7194ee62a61e085069679525138c4'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96730'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5j3g-jfq3-7jwx'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/bassmaster'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40689/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70180'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:29Z', 'nvd_published_at': None}
1.4.0
GHSA-q44r-f2hm-v76v
2023-05-12T17:21:34Z
2017-10-24T18:33:37Z
null
['CVE-2012-3867']
Pupper does not properly restrict characters in Common Name field of Certificate Signing Request
`lib/puppet/ssl/certificate_authority.rb` in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into signing a crafted agent certificate via ANSI control sequences.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839158'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3867.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3867-insufficient-input-validation'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3867/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:50Z', 'nvd_published_at': None}
1.4.0
GHSA-6h5q-96hp-9jgm
2023-08-25T18:48:39Z
2017-10-24T18:33:36Z
null
['CVE-2013-6415']
actionpack vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in the `number_to_currency` helper in `actionpack/lib/action_view/helpers/number_helper.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via the unit parameter.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6415'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h5q-96hp-9jgm'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6415.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9WiRn2nhfq0/2K2KRB4LwCMJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6415'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20131206180005/http://www.securityfocus.com/bid/64077'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:20Z', 'nvd_published_at': None}
1.4.0
GHSA-9h36-4jf2-hx53
2023-01-23T20:56:41Z
2017-10-24T18:33:37Z
null
['CVE-2013-1802']
extlib does not properly restrict casts of string values
The extlib gem 0.9.15 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'extlib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1802'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917233'}, {'type': 'PACKAGE', 'url': 'https://github.com/datamapper/extlib'}, {'type': 'WEB', 'url': 'https://github.com/datamapper/extlib/compare/b4f98174ec35ac96f76a08d5624fad05d22879b5...4540e7102b803624cc2eade4bb8aaaa934fc31c5'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/extlib/CVE-2013-1802.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00002.html'}]
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:42Z', 'nvd_published_at': None}
1.4.0
GHSA-r7q2-5gqg-6c7q
2023-05-12T17:22:22Z
2017-10-24T18:33:38Z
null
['CVE-2011-2929']
actionpack Improper Input Validation vulnerability
The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2929'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731432'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-2929.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:54Z', 'nvd_published_at': None}
1.4.0
GHSA-rprj-g6xc-p5gq
2023-07-04T00:25:07Z
2017-10-24T18:33:37Z
null
['CVE-2013-4413']
Wicked gem contains Path traversal vulnerability
The Wicked gem prior to v1.0.1 allows a remote attacker to traverse directories on the system via a vulnerability in `controller/concerns/render_redirect.rb`. An attacker can send a specially-crafted URL request containing `%2E%2E%2F` directory traversal sequences to read arbitrary files on the system.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'wicked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4413'}, {'type': 'WEB', 'url': 'https://github.com/schneems/wicked/commit/fe31bb2533fffc9d098c69ebeb7afc3b80509f53'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87783'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rprj-g6xc-p5gq'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/wicked/CVE-2013-4413.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schneems/wicked'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210508170740/http://www.securityfocus.com/bid/62891'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/43'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:24Z', 'nvd_published_at': None}
1.4.0
GHSA-cj43-9h3w-v976
2022-10-04T21:44:45Z
2017-10-24T18:33:37Z
null
['CVE-2013-4761']
Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service
Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified "local file system access" to the Puppet Master.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.23'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-4761.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-4761-resourcetype-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2013-4761/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2761'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:52Z', 'nvd_published_at': None}
1.4.0
GHSA-w248-xr37-jx8m
2023-08-28T13:51:43Z
2017-10-24T18:33:37Z
null
['CVE-2013-2615']
fastreader Gem for Ruby URI Handling Arbitrary Command Injection
fastreader Gem for Ruby contains a flaw that is triggered during the handling of specially crafted input passed via a URL that contains a ';' character. This may allow a context-dependent attacker to potentially execute arbitrary commands.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fastreader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fastreader/CVE-2013-2615.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/122'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:12Z', 'nvd_published_at': None}
1.4.0
GHSA-4ww3-3rxj-8v6q
2023-05-12T15:23:22Z
2017-10-24T18:33:38Z
null
['CVE-2011-0449']
actionpack allows remote attackers to bypass intended access restrictions
`actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0449'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6f80224057803f85b3f448936aae89e742452c3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionpack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0449.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207190612/http://securitytracker.com/id?1025061'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:33Z', 'nvd_published_at': None}
1.4.0
GHSA-34r7-q49f-h37c
2021-10-29T14:15:03Z
2017-10-24T18:33:36Z
null
['CVE-2015-8857']
Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
Versions of `uglify-js` prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification. ## Recommendation Upgrade UglifyJS to version >= 2.4.24.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.24'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uglifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}, {'type': 'WEB', 'url': 'https://github.com/mishoo/UglifyJS2/issues/751'}, {'type': 'WEB', 'url': 'https://github.com/lautis/uglifier/commit/4677bfe38142937ff952f95605bcec4618892c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/mishoo/UglifyJS2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uglifier/CVE-2015-8857.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190830/http://www.securityfocus.com/bid/96410'}, {'type': 'WEB', 'url': 'https://zyan.scripts.mit.edu/blog/backdooring-js/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-1254', 'CWE-670'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:00Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}
1.4.0
GHSA-wpw7-wxjm-cw8r
2023-08-25T19:25:00Z
2017-10-24T18:33:36Z
null
['CVE-2013-6417']
actionpack allows bypass of database-query restrictions
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.2.16 and 4.x before 4.0.2 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request that leverages (1) third-party Rack middleware or (2) custom Rack middleware. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-0155.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6417'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6417.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/niK4drpSHT4/g8JW8ZsayRkJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806051251/https://puppet.com/security/cve/cve-2013-6417'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0469.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:55Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}
1.4.0
GHSA-cqr7-78pj-3g7j
2021-09-09T20:31:02Z
2017-10-24T18:33:36Z
null
['CVE-2014-3742']
File Descriptor Leak Can Cause DoS Vulnerability in hapi
Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak. When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified. ## Recommendation - Please upgrade to version 2.2.x or above as soon as possible.
[]
[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742'}, {'type': 'WEB', 'url': 'https://github.com/spumko/hapi/issues/1427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/spumko/hapi'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:30Z', 'nvd_published_at': None}
1.4.0
GHSA-3crr-9vmg-864v
2023-08-25T23:15:31Z
2017-10-24T18:33:37Z
null
['CVE-2013-1854']
Active Record Improper Input Validation
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0699'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-1854'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=921329'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-1854.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0699.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:54Z', 'nvd_published_at': '2013-03-19T22:55:00Z'}
1.4.0
GHSA-p673-hjf2-pwfr
2023-07-03T23:38:02Z
2017-10-24T18:33:37Z
null
['CVE-2013-1875']
Shell command injection in command_wrap
command_wrap.rb in the command_wrap Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL or filename.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'command_wrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p673-hjf2-pwfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/command_wrap/CVE-2013-1875.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/slicertje/commandwrap'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120847/Ruby-Gem-Command-Wrap-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/175'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:11Z', 'nvd_published_at': None}
1.4.0
GHSA-q86f-fmqf-qrf6
2023-09-05T21:08:32Z
2017-10-24T18:33:36Z
null
['CVE-2015-9097']
Mail Gem CRLF Injection vulnerability
The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/issues/215'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/pull/1097'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/137631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q86f-fmqf-qrf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://rubysec.com/advisories/mail-OSVDB-131677'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/12/11/3'}, {'type': 'WEB', 'url': 'http://www.mbsd.jp/Whitepaper/smtpi.pdf'}]
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:27Z', 'nvd_published_at': None}
1.4.0
GHSA-mhwp-qhpc-h3jm
2023-03-14T20:49:26Z
2017-10-24T18:33:36Z
null
['CVE-2014-3482']
SQL Injection in Active Record
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper bitstring quoting.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3482'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/07/02/5'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0876.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2982'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:25Z', 'nvd_published_at': None}
1.4.0
GHSA-m7fq-cf8q-35q7
2023-01-23T21:21:34Z
2017-10-24T18:33:37Z
null
['CVE-2013-1800']
crack does not properly restrict casts of string values
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'crack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=804721'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/crack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/crack/CVE-2013-1800.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html'}]
{'cwe_ids': ['CWE-704', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:16Z', 'nvd_published_at': None}
1.4.0
GHSA-959j-5g9v-3fpq
2023-08-25T22:59:09Z
2017-10-24T18:33:36Z
null
['CVE-2014-1234']
Paratrooper-newrelic Exposes of Sensitive Information to an Unauthorized Actor
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-newrelic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-newrelic/CVE-2014-1234.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/2'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:37Z', 'nvd_published_at': None}
1.4.0
GHSA-33pp-3763-mrfp
2023-03-01T18:54:54Z
2017-10-24T18:33:36Z
null
['CVE-2014-7819']
sprockets vulnerable to Path Traversal
Multiple directory traversal vulnerabilities in `server.rb` in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11.0'}, {'fixed': '2.11.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2014-7819'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1161527'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:55Z', 'nvd_published_at': '2014-11-08T11:55:00Z'}
1.4.0
GHSA-4whc-pp4x-9pf3
2023-01-20T22:28:49Z
2017-10-24T18:33:36Z
null
['CVE-2015-1840']
jquery-rails and jquery-ujs subject to Exposure of Sensitive Information
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ujs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1840'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4whc-pp4x-9pf3'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/jquery-rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-ujs/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ujs/CVE-2015-1840.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/XIZPbobuwaY/fqnzzpuOlA4J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084945/http://www.securityfocus.com/bid/75239'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160906.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00041.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/15'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:28Z', 'nvd_published_at': None}
1.4.0
GHSA-vxp4-25qp-86qh
2020-06-17T15:15:14Z
2017-10-24T18:33:36Z
2020-06-17T15:15:14Z
[]
Moderate severity vulnerability that affects ember
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in Ember.js 1.8.x through 1.10.x, 1.11.x before 1.11.4, 1.12.x before 1.12.2, 1.13.x before 1.13.12, 2.0.x before 2.0.3, 2.1.x before 2.1.2, and 2.2.x before 2.2.1 allows remote attackers to inject arbitrary web script or HTML.
[]
[{'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.11.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ember'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxp4-25qp-86qh'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:14Z', 'nvd_published_at': None}
1.4.0
GHSA-ghqm-pgxj-37gq
2023-01-23T21:16:04Z
2017-10-24T18:33:36Z
null
['CVE-2015-7580']
rails-html-sanitizer Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `lib/rails/html/scrubbers.rb` in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/15'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:28Z', 'nvd_published_at': None}
1.4.0
GHSA-75w6-p6mg-vh8j
2023-05-26T16:09:49Z
2017-10-24T18:33:38Z
null
['CVE-2011-0446']
Rails actionpack gem vulnerable to Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in the `mail_to` helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0446'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/abe97736b8316f1b714cac56c115c0779aa73217'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e3dd2107c57a8efaaea5d61cf8da65f7444760b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2011-0446.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527023027/http://www.securityfocus.com/bid/46291'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812054342/http://www.securitytracker.com/id?1025064'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2247'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:29Z', 'nvd_published_at': None}
1.4.0
GHSA-q5pq-pgrv-fh89
2023-09-05T23:30:40Z
2017-10-24T18:33:36Z
null
['CVE-2014-9682']
dns-sync command injection vulnerability
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
[]
[{'package': {'ecosystem': 'npm', 'name': 'dns-sync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89'}, {'type': 'PACKAGE', 'url': 'https://github.com/skoranga/node-dns-sync'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/11/11/6'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:07Z', 'nvd_published_at': None}
1.4.0
GHSA-699m-mcjm-9cw8
2023-08-25T19:05:47Z
2017-10-24T18:33:37Z
null
['CVE-2013-4491']
actionpack vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/translation_helper.rb` in the internationalization component in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted string that triggers generation of a fallback string by the i18n gem.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4491'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-699m-mcjm-9cw8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-4491.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:44Z', 'nvd_published_at': None}
1.4.0
GHSA-3m6r-39p3-jq25
2022-04-25T16:34:57Z
2017-10-24T18:33:35Z
null
['CVE-2016-6582']
Doorkeeper is vulnerable to replay attacks
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6582'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/875'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3m6r-39p3-jq25'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doorkeeper/CVE-2016-6582.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214021758/http://www.securityfocus.com/bid/92551'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207202519/http://www.securityfocus.com/archive/1/539268/100/0/threaded'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/138430/Doorkeeper-4.1.0-Token-Revocation.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2016/Aug/105'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/19/2'}]
{'cwe_ids': ['CWE-1254'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:30Z', 'nvd_published_at': None}
1.4.0
GHSA-q34c-48gc-m9g8
2023-05-12T17:20:28Z
2017-10-24T18:33:38Z
null
['CVE-2012-2694']
actionpack allows remote attackers to bypass database-query restrictions, perform NULL checks via crafted request
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `['xyz', nil]` values, a related issue to CVE-2012-2660.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2694'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2694.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/e2d3a87f2c211def?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:37Z', 'nvd_published_at': None}
1.4.0
GHSA-xwg4-93c6-3h42
2021-09-22T17:58:56Z
2017-10-24T18:33:36Z
null
['CVE-2014-6394']
Directory Traversal in send
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`. ## Recommendation Update to version 0.8.4 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/pull/59'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwg4-93c6-3h42'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/send'}, {'type': 'WEB', 'url': 'https://support.apple.com/HT205217'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/32'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/24/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/30/10'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/70100'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:41Z', 'nvd_published_at': None}
1.4.0
GHSA-rg5m-3fqp-6px8
2023-07-04T00:18:31Z
2017-10-24T18:33:37Z
null
['CVE-2013-4389']
actionmailer email address processing causes Denial of service
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4389'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/actionmailer'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2887'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}]
{'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:42Z', 'nvd_published_at': None}
1.4.0
GHSA-229r-pqp6-8w6g
2023-08-29T15:58:19Z
2017-10-24T18:33:36Z
null
['CVE-2013-6421']
sprout Arbitrary Code Execution vulnerability
The `unpack_zip` function in `archive_unpacker.rb` in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sprout'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.7.246']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6421'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukebayes/project-sprouts'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sprout/CVE-2013-6421.yml'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/03/6'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:50:49Z', 'nvd_published_at': None}
1.4.0
GHSA-4936-rj25-6wm6
2023-01-20T22:08:42Z
2017-10-24T18:33:37Z
null
['CVE-2013-0285']
nori contains Improper Input Validation
The nori gem 2.0.x before 2.0.2, 1.1.x before 1.1.4, and 1.0.x before 1.0.3 for Ruby does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'nori'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0285'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/2ca6f8603e406f884a8fcea6bc26f8f6bf168f40'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/4bcf59abdcec6bcd1153241b122eda61a494e4fb'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/818f5263b1d597b603d46cbe1702cd2717259e32'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c3fdce7a2d2670b44f1cda35da0ae73cc1372084'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/c5e07f5c32e615f0a4a7ee2782d37f7a33261be4'}, {'type': 'WEB', 'url': 'https://github.com/savonrb/nori/commit/d9b68667249b98776fb23ba9e9c548dc4b524709'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4936-rj25-6wm6'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nori/CVE-2013-0285.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/savonrb/nori'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130203232028/https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:55Z', 'nvd_published_at': None}
1.4.0
GHSA-9959-c6q6-6qp3
2020-06-17T16:30:41Z
2017-10-24T18:33:36Z
2020-06-17T16:30:41Z
[]
Moderate severity vulnerability that affects validator
**Withdrawn:** Duplicate of GHSA-79mx-88w7-8f7q
[]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9959-c6q6-6qp3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:41Z', 'nvd_published_at': None}
1.4.0
GHSA-rgr4-9jh5-j4j6
2023-03-14T21:47:07Z
2017-10-24T18:33:36Z
null
['CVE-2015-3225']
Rack vulnerable to Denial of Service via large parameter depth request
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/HISTORY.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2015-3225.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164173.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165180.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00040.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00044.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/14'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2290.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3322'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:48Z', 'nvd_published_at': None}
1.4.0
GHSA-rp63-jfmw-532w
2023-09-05T22:04:31Z
2017-10-24T18:33:38Z
null
['CVE-2012-2140']
Mail Gem Improper Input Validation vulnerability
The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:16Z', 'nvd_published_at': None}
1.4.0
GHSA-333x-9vgq-v2j4
2021-08-31T20:33:50Z
2017-10-24T18:33:36Z
null
['CVE-2015-5688']
Directory Traversal in geddy
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors. ### Proof of Concept ``` http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd ``` ## Recommendation Update geddy to version >= 13.0.8
[]
[{'package': {'ecosystem': 'npm', 'name': 'geddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/issues/697'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/pull/699'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-333x-9vgq-v2j4'}, {'type': 'PACKAGE', 'url': 'https://github.com/geddy/geddy'}, {'type': 'WEB', 'url': 'https://github.com/geddy/geddy/releases/tag/v13.0.8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/10'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:48Z', 'nvd_published_at': None}
1.4.0
GHSA-jgqf-hwc5-hh37
2021-09-14T19:42:25Z
2017-10-24T18:33:36Z
null
['CVE-2015-8859']
Root Path Disclosure in send
Versions of `send` prior to 0.11.2 are affected by an information leakage vulnerability which may allow an attacker to enumerate paths on the server filesystem. ## Recommendation Update to version 0.11.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'send'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8859'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/pull/70'}, {'type': 'WEB', 'url': 'https://github.com/pillarjs/send/commit/98a5b89982b38e79db684177cf94730ce7fc7aed'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-static/blob/master/HISTORY.md#181--2015-01-20'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillarjs/send'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227192016/https://www.securityfocus.com/bid/96435/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:23Z', 'nvd_published_at': None}
1.4.0
GHSA-fgmx-8h93-26fh
2023-01-25T23:20:49Z
2017-10-24T18:33:37Z
null
['CVE-2012-6134']
omniauth-oauth2 Cross-Site Request Forgery vulnerability
Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem prior to 1.1.1 for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6134'}, {'type': 'WEB', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/intridea/omniauth-oauth2/pull/25'}, {'type': 'PACKAGE', 'url': 'https://github.com/Shopify/omniauth-shopify-oauth2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-oauth2/CVE-2012-6134.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170312020947/https://gist.github.com/homakov/3673012'}, {'type': 'WEB', 'url': 'http://rubysec.github.io/advisories/CVE-2012-6134/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:38Z', 'nvd_published_at': None}
1.4.0
GHSA-fg9w-g6m4-557j
2023-05-26T17:12:19Z
2017-10-24T18:33:38Z
null
['CVE-2009-3086']
actionpack and activesupport vulnerable to information leaks
A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x before 2.3.4, leaks information about the complexity of message-digest signature verification in the cookie store, which might allow remote attackers to forge a digest via multiple attempts.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3086'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d460c9a25560f43e7c3789abadf7b455053eb686'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3086.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/http://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090907001716/http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229150042/http://www.securityfocus.com/bid/37427'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:36Z', 'nvd_published_at': None}
1.4.0
GHSA-pr3r-4wrp-r2pv
2023-07-04T00:01:26Z
2017-10-24T18:33:35Z
null
['CVE-2016-6317']
ActiveRecord in Ruby on Rails allows database-query bypass
Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2016-6317.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/WccgKSKiPZA'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/4'}]
{'cwe_ids': ['CWE-284', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:56Z', 'nvd_published_at': None}
1.4.0
GHSA-qv8p-v9qw-wc7g
2023-01-23T18:01:41Z
2017-10-24T18:33:38Z
null
['CVE-2012-1098']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated through certain methods.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1098'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799275'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/1c2e01a5e42722c9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/02/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/03/03/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:51Z', 'nvd_published_at': None}
1.4.0
GHSA-f522-ffg8-j8r6
2021-09-09T21:38:37Z
2017-10-24T18:33:35Z
null
['CVE-2016-2537']
Regular Expression Denial of Service in is-my-json-valid
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. ## Recommendation Update to version 1.4.1, 2.17.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317548'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f522-ffg8-j8r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/mafintosh/is-my-json-valid'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/572'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/76'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:36Z', 'nvd_published_at': None}
1.4.0
GHSA-c9f4-xj24-8jqx
2021-09-08T21:59:09Z
2017-10-24T18:33:36Z
null
['CVE-2015-8858']
Regular Expression Denial of Service in uglify-js
Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method. ### Proof of Concept ``` var u = require('uglify-js'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;"); ``` ### Results ``` $ time node test.js 10000 real 0m1.091s user 0m1.047s sys 0m0.039s $ time node test.js 80000 real 0m6.486s user 0m6.229s sys 0m0.094s ``` ## Recommendation Update to version 2.6.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'uglify-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/48'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96409'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:50Z', 'nvd_published_at': None}
1.4.0
GHSA-m6f7-46hw-grcj
2023-03-14T20:44:40Z
2017-10-24T18:33:37Z
null
['CVE-2013-2090']
Creme Fraiche contains OS Command Injection
The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cremefraiche'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:09Z', 'nvd_published_at': None}
1.4.0
GHSA-67j6-xv27-w6ww
2023-03-14T23:11:59Z
2017-10-24T18:33:36Z
null
['CVE-2015-3224']
Web Console (Ruby gem) contains whitelisted_ips bypass
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'web-console'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/web-console'}, {'type': 'WEB', 'url': 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/web-console/CVE-2015-3224.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/18'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:18Z', 'nvd_published_at': None}
1.4.0
GHSA-x6fg-f45m-jf5q
2021-09-21T22:15:35Z
2017-10-24T18:33:36Z
null
['CVE-2015-8855']
Regular Expression Denial of Service in semver
Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Recommendation Update to version 4.3.2 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x6fg-f45m-jf5q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/31'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/86957'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:25Z', 'nvd_published_at': None}
1.4.0
GHSA-r23g-3qw4-gfh2
2023-08-28T19:55:45Z
2017-10-24T18:33:37Z
null
['CVE-2012-6684']
RedCloth Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a `javascript:` URI.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6684'}, {'type': 'WEB', 'url': 'https://co3k.org/blog/redcloth-unfixed-xss-en'}, {'type': 'WEB', 'url': 'https://gist.github.com/co3k/75b3cb416c342aa1414c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/RedCloth/CVE-2012-6684.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Dec/50'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3168'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:16Z', 'nvd_published_at': None}
1.4.0
GHSA-rh6c-q938-3r9q
2021-09-17T18:17:08Z
2017-10-24T18:33:36Z
null
['CVE-2013-7452']
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via a crafted javascript URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7452'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rh6c-q938-3r9q'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:50Z', 'nvd_published_at': None}
1.4.0
GHSA-hxx6-p24v-wg8c
2023-08-29T10:57:50Z
2017-10-24T18:33:37Z
null
['CVE-2013-2617']
Curl Gem insufficient URL escaping command injection
`lib/curl.rb` in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'curl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2617'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/curl/CVE-2013-2617.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/tggo/curl'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:31Z', 'nvd_published_at': None}
1.4.0
GHSA-gcqq-w6gr-h9j9
2023-01-26T20:55:34Z
2017-10-24T18:33:35Z
null
['CVE-2017-5946']
Directory traversal vulnerability in RubyZip
The `Zip::File` component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses `../` pathname substrings to write arbitrary files to the filesystem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/315'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/commit/ce4208fdecc2ad079b05d3c49d70fe6ed1d07016'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2017-5946.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/releases'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227185727/http://www.securityfocus.com/bid/96445'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3801'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:51Z', 'nvd_published_at': None}
1.4.0
GHSA-p4c6-77gc-694x
2023-05-11T13:54:28Z
2017-10-24T18:33:38Z
null
['CVE-2007-6077']
session fixation protection mechanism in cgi_process.rb in Rails
The session fixation protection mechanism in cgi_process.rb in Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only attribute from the DEFAULT_SESSION_OPTIONS constant, which effectively causes cookie_only to be applied only to the first instantiation of CgiRequest, which allows remote attackers to conduct session fixation attacks. NOTE: this is due to an incomplete fix for CVE-2007-5380.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6077'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p4c6-77gc-694x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-6077.yml'}, {'type': 'WEB', 'url': 'https://rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/changeset/8177'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/10048'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27781'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26598'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4009'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:57Z', 'nvd_published_at': None}
1.4.0
GHSA-f7p5-w2cr-7cp7
2023-05-12T17:27:38Z
2017-10-24T18:33:37Z
null
['CVE-2013-3567']
Puppet Improper Input Validation vulnerability
Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet Enterprise before 2.8.2, deserializes untrusted YAML, which allows remote attackers to instantiate arbitrary Ruby classes and execute arbitrary code via a crafted REST API call.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.22'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-3567.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-3567/'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1283.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1284.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2715'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1886-1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:01Z', 'nvd_published_at': None}
1.4.0
GHSA-pc3m-v286-2jwj
2023-01-23T17:59:42Z
2017-10-24T18:33:35Z
null
['CVE-2016-6316']
actionview Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.0.1'}]}], 'versions': ['5.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-6316.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227202008/http://www.securityfocus.com/bid/92430'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200812154343/https://puppet.com/security/cve/cve-2016-6316'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1855.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1856.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1857.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-1858.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3651'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/08/11/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:48Z', 'nvd_published_at': None}
1.4.0
GHSA-6h88-qjpv-p32m
2022-04-25T16:33:57Z
2017-10-24T18:33:35Z
null
['CVE-2016-7798']
OpenSSL gem for Ruby using inadequate encryption strength
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7798'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/issues/49'}, {'type': 'WEB', 'url': 'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6h88-qjpv-p32m'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/openssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/openssl/CVE-2016-7798.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210121065227/https://www.securityfocus.com/bid/93031/info'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2017/dsa-3966'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/19/9'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/09/30/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/10/01/2'}]
{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:22Z', 'nvd_published_at': None}
1.4.0
GHSA-gm25-fpmr-43fj
2023-05-11T13:41:22Z
2017-10-24T18:33:38Z
null
['CVE-2007-3227']
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gm25-fpmr-43fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-3227.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8371'}, {'type': 'WEB', 'url': 'http://osvdb.org/36378'}, {'type': 'WEB', 'url': 'http://pastie.caboo.se/65550.txt'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/25699'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27756'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_24_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/24161'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/2216'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:37Z', 'nvd_published_at': None}
1.4.0
GHSA-cpjc-p7fc-j9xh
2023-01-23T21:15:08Z
2017-10-24T18:33:38Z
null
['CVE-2011-0739']
Mail Improper Input Validation vulnerability
The deliver function in the sendmail delivery agent (`lib/mail/network/delivery_methods/sendmail.rb`) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0739'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mail/CVE-2011-0739.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228225346/http://www.securityfocus.com/bid/46021'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:10Z', 'nvd_published_at': None}
1.4.0
GHSA-h56m-vwxc-3qpw
2023-08-25T19:56:49Z
2017-10-24T18:33:36Z
null
['CVE-2014-7829']
Directory traversal vulnerability in actionpack
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h56m-vwxc-3qpw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7829.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/rMTQy4oRCGk'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/rMTQy4oRCGk/loS_CRS8mNEJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160403085126/http://www.securityfocus.com/bid/71183'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:46Z', 'nvd_published_at': '2014-11-18T23:59:00Z'}
1.4.0
GHSA-98mf-8f57-64qf
2023-01-23T16:34:24Z
2017-10-24T18:33:37Z
null
['CVE-2012-3463']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/form_tag_helper.rb` in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the `prompt` field to the `select_tag` helper.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/6d0526db91afb0675c2ad3d871529d1536303c64'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/fV3QUToSMSw/m/eHBSFOUYHpYJ?pli=1'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:55Z', 'nvd_published_at': None}
1.4.0
GHSA-p692-7mm3-3fxg
2023-07-31T20:59:11Z
2017-10-24T18:33:36Z
null
['CVE-2015-7576']
actionpack is vulnerable to remote bypass authentication
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/17e6f1507b7f2c2a883c180f4f9548445d6dfbd'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7576.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/ANv0HDHEC3k/T8Hgq-hYEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81803'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178068.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/8'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:14Z', 'nvd_published_at': None}
1.4.0
GHSA-92v7-pq4h-58j5
2023-06-07T14:06:11Z
2017-10-24T18:33:36Z
null
['CVE-2014-3248']
facter, hiera, mcollective-client, and puppet affected by untrusted search path vulnerability
Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, allows local users to gain privileges via a Trojan horse file in the current working directory, as demonstrated using (1) `rubygems/defaults/operating_system.rb`, (2) `Win32API.rb`, (3) `Win32API.so`, (4) `safe_yaml.rb`, (5) `safe_yaml/deep.rb`, or (6) `safe_yaml/deep.so`; or (7) `operatingsystem.rb`, (8) `operatingsystem.so`, (9) `osfamily.rb`, or (10) `osfamily.so` in `puppet/confine`.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'facter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'hiera'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.26'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'mcollective-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3248'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/facter/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/hiera/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mcollective-client/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2014-3248.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20141129061319/http://www.securityfocus.com/bid/68035'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150204183209/http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150907182402/http://puppetlabs.com/security/cve/cve-2014-3248'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:08Z', 'nvd_published_at': '2014-11-16T17:59:00Z'}
1.4.0
GHSA-hgpp-pp89-4fgf
2023-08-25T23:26:17Z
2017-10-24T18:33:38Z
null
['CVE-2012-2660']
Action Pack contains database-query restrictions bypass
`actionpack/lib/action_dispatch/http/request.rb` in Ruby on Rails before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences in parameter handling between the Active Record component and the Rack interface, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks via a crafted request, as demonstrated by certain `[nil]` values, a related issue to CVE-2012-2694.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2660'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2660.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/8SA-M3as7A8/m/Mr9fi9X4kNgJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/d890f8d58b5fbf32?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:14Z', 'nvd_published_at': None}
1.4.0
GHSA-29gr-w57f-rpfw
2023-08-25T19:41:02Z
2017-10-24T18:33:36Z
null
['CVE-2014-7818']
actionpack vulnerable to Path Traversal
Directory traversal vulnerability in `actionpack/lib/action_dispatch/middleware/static.rb` in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when `serve_static_assets` is enabled, allows remote attackers to determine the existence of files outside the application root via a `/..%2F` sequence.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0.beta1'}, {'fixed': '4.2.0.beta3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gr-w57f-rpfw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-7818.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dCp7duBiQgo'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/dCp7duBiQgo/v_R_8PFs5IwJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2014-7829'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00112.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:48Z', 'nvd_published_at': '2014-11-08T11:55:00Z'}
1.4.0
GHSA-xgr2-v94m-rc9g
2023-08-25T20:10:51Z
2017-10-24T18:33:37Z
null
['CVE-2013-0333']
activesupport in Rails vulnerable to incorrect data conversion
`lib/active_support/json/backends/yaml.rb` in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data for processing by a YAML parser, which allows remote attackers to execute arbitrary code, conduct SQL injection attacks, or bypass authentication via crafted data that triggers unsafe decoding, a different vulnerability than CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.2'}, {'fixed': '2.3.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0202'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0203'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=903440'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgr2-v94m-rc9g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2013-0333.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/52179af76915e518?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0333'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0201.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0202.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0203.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2613'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:24Z', 'nvd_published_at': '2013-01-30T12:00:00Z'}
1.4.0
GHSA-9hx9-w2j6-rw76
2023-07-05T18:52:49Z
2017-10-24T18:33:37Z
null
['CVE-2013-2105']
Script Injection in Show In Browser gem
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on `/tmp/browser.html`.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'show_in_browser'}, 'versions': ['0.0.3']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2105'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84378'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9hx9-w2j6-rw76'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/show_in_browser/CVE-2013-2105.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/show_in_browser.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/05/18/4'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:50Z', 'nvd_published_at': None}
1.4.0
GHSA-7fqj-cg79-f2pv
2023-08-28T13:54:43Z
2017-10-24T18:33:37Z
null
['CVE-2013-1898']
Thumbshooter vulnerable to Code Injection
lib/thumbshooter.rb in the Thumbshooter 0.1.5 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'thumbshooter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1898'}, {'type': 'PACKAGE', 'url': 'https://github.com/digineo/thumbshooter'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thumbshooter/CVE-2013-1898.yml'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/218'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/thumbshooter-ruby-gem-remoteexec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/3'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:40Z', 'nvd_published_at': None}
1.4.0
GHSA-j5hj-fhc9-g24m
2023-01-23T21:18:15Z
2017-10-24T18:33:35Z
null
['CVE-2016-4442']
rack-mini-profiler allows remote attackers to obtain sensitive information about allocated strings and objects
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-mini-profiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c'}, {'type': 'PACKAGE', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/'}, {'type': 'WEB', 'url': 'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/06/10/2'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:03Z', 'nvd_published_at': None}
1.4.0
GHSA-h835-75hw-pj89
2023-01-23T17:34:24Z
2017-10-24T18:33:37Z
null
['CVE-2012-3464']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.rb` in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/7215'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/28f2c6f4037081da0a82104a3f473165ed4ed2ce'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/780a718723cf87b49cfe204d355948c4e0932d23'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/d0c9759d3aeb6327d68dd6c0de0fe2fed4e3c870'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h835-75hw-pj89'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2012-3464.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/50694'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:28Z', 'nvd_published_at': None}
1.4.0
GHSA-gh2w-j7cx-2664
2023-03-14T19:07:57Z
2017-10-24T18:33:37Z
null
['CVE-2012-6496']
Active Record contains SQL Injection
SQL injection vulnerability in the Active Record component in Ruby on Rails before 3.0.18, 3.1.x before 3.1.9, and 3.2.x before 3.2.10 allows remote attackers to execute arbitrary SQL commands via a crafted request that leverages incorrect behavior of dynamic finders in applications that can use unexpected data types in certain find_by_ method calls.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6496'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=889649'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/23daa048baf28b64?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0220.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201401-22.xml'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:20Z', 'nvd_published_at': None}
1.4.0
GHSA-9wrq-xvmp-xjc8
2021-12-01T19:40:37Z
2017-10-24T18:33:38Z
null
['CVE-2006-4112']
High severity vulnerability that affects rails.
Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4112.yml'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21424'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/699540'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/archive/1/442934/100/0/threaded'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:44Z', 'nvd_published_at': None}
1.4.0
GHSA-jwhv-rgqc-fqj5
2023-05-11T13:50:52Z
2017-10-24T18:33:38Z
null
['CVE-2007-5380']
Session fixation vulnerability in Rails
Session fixation vulnerability in Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers to hijack web sessions via unspecified vectors related to "URL-based sessions."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5380'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jwhv-rgqc-fqj5'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5380.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27965'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2007_25_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:15Z', 'nvd_published_at': None}
1.4.0
GHSA-hxhj-hp9m-qwc4
2023-01-23T17:38:44Z
2017-11-29T23:21:05Z
null
['CVE-2017-0904']
private_address_check vulnerable to bypass of Resolv.getaddresses method
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's `Resolv.getaddresses` method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'private_address_check'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287245'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/287835'}, {'type': 'WEB', 'url': 'https://edoverflow.com/2017/ruby-resolv-bug/'}]
{'cwe_ids': ['CWE-242'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:23Z', 'nvd_published_at': None}
1.4.0
GHSA-x7p2-x2j6-mwhr
2023-08-29T12:26:53Z
2017-11-29T23:19:51Z
null
['CVE-2017-16833']
Gemirro Stored XSS in Gemspec "homepage" value
Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file. A ".gemspec" file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload to the Gemirro server, in order to achieve stored XSS via the author name hyperlink.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gemirro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16833'}, {'type': 'WEB', 'url': 'https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de'}, {'type': 'PACKAGE', 'url': 'https://github.com/PierreRambaud/gemirro'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gemirro/CVE-2017-16833.yml'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:30Z', 'nvd_published_at': None}
1.4.0
GHSA-7qcx-jmrc-h2rr
2021-09-03T21:41:16Z
2017-11-15T19:44:16Z
null
['CVE-2017-15878']
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser. ## Recommendation Update to version 4.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43054/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/980'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101541'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:19Z', 'nvd_published_at': None}
1.4.0
GHSA-rph7-j9qr-h8q8
2021-09-17T19:23:32Z
2017-11-28T22:20:17Z
null
['CVE-2013-7377']
Potential Command Injection in codem-transcode
When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution. ### Mitigating Factors: The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default. ## Recommendation An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'codem-transcode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7377'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rph7-j9qr-h8q8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:22Z', 'nvd_published_at': None}
1.4.0
GHSA-hwcf-pp87-7x6p
2023-09-08T21:35:56Z
2017-11-30T23:15:05Z
null
['CVE-2017-1000188']
mde ejs vulnerable to XSS
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the `ejs.renderFile()` resulting in code injection
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ejs'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227134555/http://www.securityfocus.com/bid/101889'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:14Z', 'nvd_published_at': None}
1.4.0
GHSA-5c8j-xr24-2665
2021-09-01T21:34:20Z
2017-11-28T22:44:52Z
null
['CVE-2014-3741']
Potential Command Injection in printer
Versions 0.0.1 and earlier of `printer` are affected by a command injection vulnerability resulting from a failure to sanitize command arguments properly in the `printDirect()` function. ## Recommendation Update to version 0.0.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'printer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3741'}, {'type': 'WEB', 'url': 'https://github.com/tojocky/node-printer/commit/e001e38738c17219a1d9dd8c31f7d82b9c0013c7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8j-xr24-2665'}, {'type': 'PACKAGE', 'url': 'https://github.com/tojocky/node-printer'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/27'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:28Z', 'nvd_published_at': None}
1.4.0
GHSA-pjj4-w39g-pw54
2023-01-26T21:23:13Z
2017-11-21T18:26:40Z
null
['CVE-2017-15928']
Ox gem crashes due to a crafted input
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to `parse_obj`. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15928'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/194'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-15928.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/ox/versions/2.8.0'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:23Z', 'nvd_published_at': None}
1.4.0
GHSA-q43c-g2g7-6gxj
2021-06-10T21:18:39Z
2017-11-30T23:14:47Z
null
['CVE-2017-16570']
Cross-Site Request Forgery (CSRF) in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints. ## Recommendation Update to version 4.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0-beta.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/4437'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/4478'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj'}, {'type': 'WEB', 'url': 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43922/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/979'}, {'type': 'WEB', 'url': 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:45Z', 'nvd_published_at': None}