Skip to content

Commit b32baf6

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 4 modified new advisories
1 parent 161d6cf commit b32baf6

File tree

4 files changed

+31
-11
lines changed

4 files changed

+31
-11
lines changed

gems/actionpack/CVE-2023-28362.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ description: |
3030
3131
Avoid providing user supplied URLs with arbitrary schemes to the redirect_to
3232
method.
33+
cvss_v3: 4.0
3334
patched_versions:
3435
- "~> 6.1.7.4"
3536
- ">= 7.0.5.1"

gems/activesupport/CVE-2023-28120.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ description: |
2525
# Workarounds
2626
2727
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input.
28+
cvss_v3: 5.3
2829
patched_versions:
2930
- "~> 6.1.7, >= 6.1.7.3"
3031
- ">= 7.0.4.3"

gems/activesupport/CVE-2023-38037.yml

Lines changed: 25 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,31 +7,47 @@ url: https://github.com/rails/rails/releases/tag/v7.0.7.1
77
title: Possible File Disclosure of Locally Encrypted Files
88
date: 2023-08-23
99
description: |
10-
There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037.
10+
There is a possible file disclosure of locally encrypted files in
11+
Active Support. This vulnerability has been assigned the
12+
CVE identifier CVE-2023-38037.
1113
12-
Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5
14+
* Versions Affected: >= 5.2.0
15+
* Not affected: < 5.2.0
16+
* Fixed Versions: 7.0.7.1, 6.1.7.5
1317
1418
# Impact
15-
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file.
1619
17-
Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it.
20+
ActiveSupport::EncryptedFile writes contents that will be encrypted
21+
to a temporary file. The temporary file’s permissions are defaulted
22+
to the user’s current umask settings, meaning that it’s possible
23+
for other users on the same system to read the contents of the
24+
temporary file.
1825
19-
All users running an affected release should either upgrade or use one of the workarounds immediately.
26+
Attackers that have access to the file system could possibly read
27+
the contents of this temporary file while a user is editing it.
28+
29+
All users running an affected release should either upgrade or use
30+
one of the workarounds immediately.
2031
2132
# Releases
33+
2234
The fixed releases are available at the normal locations.
2335
2436
# Workarounds
25-
To work around this issue, you can set your umask to be more restrictive like this:
2637
27-
```ruby
28-
$ umask 0077
29-
```
38+
To work around this issue, you can set your umask to be more
39+
restrictive like this:
40+
41+
$ umask 0077
42+
cvss_v3: 5.5
3043
unaffected_versions:
3144
- "< 5.2.0"
3245
patched_versions:
3346
- "~> 6.1.7, >= 6.1.7.5"
3447
- ">= 7.0.7.1"
3548
related:
3649
url:
50+
- https://nvd.nist.gov/vuln/detail/CVE-2023-38037
51+
- https://github.com/rails/rails/releases/tag/v7.0.7.1
3752
- https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731
53+
- https://github.com/advisories/GHSA-cr5q-6q9f-rq6q

gems/kredis/CVE-2023-27531.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: kredis
33
framework: rails
44
cve: 2023-27531
5+
notes: CVE has be reserved, but not filled in.
56
ghsa: h2wm-p2vg-6pw4
67
url: https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
78
title: Possible Deserialization of Untrusted Data Vulnerability in Kredis JSON
@@ -34,14 +35,15 @@ description: |
3435
are in git-am format and consist of a single changeset.
3536
3637
* 1-3-0-1-kredis.patch - Patch for 1.3.0 series
37-
38+
cvss_v3: 5.3
3839
patched_versions:
3940
- ">= 1.3.0.1"
4041
related:
4142
url:
43+
- https://nvd.nist.gov/vuln/detail/CVE-2023-27531
4244
- https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
4345
- https://github.com/rails/kredis/releases/tag/v1.3.0.1
4446
- https://my.diffend.io/gems/kredis/1.3.0/1.3.0.1
4547
- https://cve.report/CVE-2023-27531
4648
- https://github.com/jasnow/gsd-database/blob/main/2023/27xxx/GSD-2023-27531.json
47-
notes: "CVE has be reserved, but not filled in."
49+
- https://github.com/advisories/GHSA-h2wm-p2vg-6pw4

0 commit comments

Comments
 (0)