diff --git a/.github/FUNDING.yml b/.github/FUNDING.yml new file mode 100644 index 00000000..261abaae --- /dev/null +++ b/.github/FUNDING.yml @@ -0,0 +1,3 @@ +github: + - reedloden + - postmodern diff --git a/.github/workflows/advisories.yml b/.github/workflows/advisories.yml new file mode 100644 index 00000000..f7c90125 --- /dev/null +++ b/.github/workflows/advisories.yml @@ -0,0 +1,38 @@ +name: Update advisories + +on: + repository_dispatch: + types: [ changed ] + +jobs: + update-advisories: + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v2 + - name: Checkout ruby-advisory-db + uses: actions/checkout@v2 + with: + repository: rubysec/ruby-advisory-db + path: _advisories + - name: Set up Ruby + uses: ruby/setup-ruby@v1 + with: + ruby-version: ruby + - name: Install dependencies + run: bundle install --jobs 4 --retry 3 + - name: Generate advisories + run: bundle exec rake advisories:generate + - name: Get latest advisory commit + id: git-commit + working-directory: _advisories + run: | + echo "::set-output name=author::$(git show -s --format='%an <%ae>')" + echo "::set-output name=hash::$(git rev-parse --short HEAD)" + - name: Commit any updates + uses: stefanzweifel/git-auto-commit-action@v4 + with: + commit_message: "Updated advisory posts against rubysec/ruby-advisory-db@${{ steps.git-commit.outputs.hash }}" + file_pattern: advisories/_posts/*.md + commit_user_name: RubySec CI + commit_user_email: ci@rubysec.com + commit_author: ${{ steps.git-commit.outputs.author }} diff --git a/404.html b/404.html new file mode 100644 index 00000000..4e02b238 --- /dev/null +++ b/404.html @@ -0,0 +1,17 @@ +--- +layout: page +title: Whoops, I couldn't find that page +footer: true +--- + +You may want to try a search above, or [visit the homepage](/). + +Also, here are some recent posts: + +
+ {% for post in site.posts limit: 10 %} +
+ {% include archive_post.html %} +
+ {% endfor %} +
diff --git a/CNAME b/CNAME index 3382a0c2..8a634083 100644 --- a/CNAME +++ b/CNAME @@ -1 +1 @@ -rubysec.com \ No newline at end of file +rubysec.com diff --git a/Gemfile b/Gemfile new file mode 100644 index 00000000..ed7bb3f0 --- /dev/null +++ b/Gemfile @@ -0,0 +1,6 @@ +source 'https://rubygems.org' + +gem 'github-pages' +gem 'rake' + +gem "webrick", "~> 1.7" diff --git a/README.md b/README.md new file mode 100644 index 00000000..ac8bd49a --- /dev/null +++ b/README.md @@ -0,0 +1,15 @@ +## rubysec.github.io + +To preview the site: + + jekyll server --watch + +To update the advisories blog posts: + + rake advisories + +To generate a static copy of the website: + + jekyll build + +To deploy, simply push to github. diff --git a/Rakefile b/Rakefile new file mode 100644 index 00000000..a1f8f6f4 --- /dev/null +++ b/Rakefile @@ -0,0 +1,52 @@ +require 'date' +require 'yaml' + +namespace :advisories do + file '_advisories' do + system 'git clone --depth 1 https://github.com/rubysec/ruby-advisory-db _advisories' + end + + desc 'Updates the advisory db' + task :update => '_advisories' do + Dir.chdir('_advisories') { sh 'git pull --ff-only' } unless ENV['CI'] + end + + desc 'Regenerate the advisory posts' + task :generate => :update do + Rake::FileList['_advisories/gems/*/*.yml'].each do |advisory_path| + advisory = YAML.safe_load_file(advisory_path, permitted_classes: [Date]) + + id = if advisory['cve'] then "CVE-#{advisory['cve']}" + elsif advisory['ghsa'] then "GHSA-#{advisory['ghsa']}" + elsif advisory['osvdb'] then "OSVDB-#{advisory['osvdb']}" + else File.basename(advisory_path, ".*") + end + slug = "#{advisory['date']}-#{id}" + post = File.join('advisories', '_posts', "#{slug}.md") + + File.open(post, 'w') do |file| + header = { + 'layout' => 'advisory', + 'title' => "#{id} (#{advisory['gem']}): #{advisory['title']}", + 'comments' => false, + 'categories' => [advisory['gem'], advisory['library'], advisory['framework'], advisory['platform']].compact, + 'advisory' => advisory + } + + YAML.dump(header, file) + file.puts '---' + end + end + end + + desc 'Commits changes to advisories/_posts/' + task :commit do + rev = Dir.chdir('_advisories') { %x(git rev-parse --short HEAD).strip } + message = "Updated advisory posts against rubysec/ruby-advisory-db@#{rev}" + + sh "git add advisories/_posts/*.md" + sh "git commit --allow-empty -m #{message.dump} advisories/_posts/" + end +end + +task :advisories => ['advisories:generate', 'advisories:commit'] diff --git a/_config.yml b/_config.yml new file mode 100644 index 00000000..3a3eb9cf --- /dev/null +++ b/_config.yml @@ -0,0 +1,41 @@ +url: https://rubysec.com +title: RubySec +subtitle: Providing security resources for the Ruby community +author: RubySec +simple_search: https://www.google.com/search +description: Advisory database of security vulnerabilities found in Ruby projects + +exclude: + [ + .bundle, + .github, + _advisories, + CNAME, + Gemfile, + Rakefile, + README.md, + vendor, + ] + +plugins: + - jekyll-paginate + - jekyll-sitemap + +subscribe_rss: /atom.xml + +permalink: /advisories/:title/ +category_dir: advisories/categories + +paginate: 10 # Posts per page on the blog index +pagination_dir: advisories # Directory base for pagination URLs eg. /blog/page/2/ +recent_posts: 5 # Posts in the sidebar Recent Posts section +excerpt_link: "Read on →" # "Continue reading" link text at the bottom of excerpted articles + +titlecase: false # Converts page and post titles to titlecase + +twitter_user: rubysec +twitter_tweet_button: true + +github_repo: rubysec/ruby-advisory-db + +google_analytics: G-P90QEESFMF diff --git a/_includes/after_footer.html b/_includes/after_footer.html new file mode 100644 index 00000000..8d8a0434 --- /dev/null +++ b/_includes/after_footer.html @@ -0,0 +1,2 @@ + + diff --git a/_includes/archive_post.html b/_includes/archive_post.html new file mode 100644 index 00000000..ace2dc0c --- /dev/null +++ b/_includes/archive_post.html @@ -0,0 +1,9 @@ + +

+ + +

{{post.title}}

+ {% if post.categories != empty or post.tags != empty %} +

posted in {% include category_links.html categories=post.categories tags=post.tags %}

+ {% endif %} + diff --git a/_includes/article.html b/_includes/article.html new file mode 100644 index 00000000..26ee7d9c --- /dev/null +++ b/_includes/article.html @@ -0,0 +1,25 @@ +{% unless page.no_header %} +
+ {% if index %} +

{% if site.titlecase %}{{ post.title | titlecase }}{% else %}{{ post.title }}{% endif %}

+ {% else %} +

{% if site.titlecase %}{{ page.title | titlecase }}{% else %}{{ page.title }}{% endif %}

+ {% endif %} + {% unless page.meta == false %} +

+ {% include post/date.html %}{{ time }} +

+ {% endunless %} +
+{% endunless %} +{% if index %} +
{{ content | excerpt }}
+ {% capture excerpted %}{{ content | has_excerpt }}{% endcapture %} + {% if excerpted == 'true' %} + + {% endif %} +{% else %} +
{{ content }}
+{% endif %} diff --git a/_includes/category_links.html b/_includes/category_links.html new file mode 100644 index 00000000..28cdcbf6 --- /dev/null +++ b/_includes/category_links.html @@ -0,0 +1,21 @@ +{% if include.categories != empty %} • + {% for category in include.categories %} + {% assign no_comma = forloop.last %} + {% for archive in site.archives %} + {% if archive.type == "category" and archive.title == category %} + {{ archive.title | escape }}{% unless no_comma %},{% endunless %} + {% endif %} + {% endfor %} + {% endfor %} +{% endif %} + +{% if include.tags != empty %} • + {% for tag in include.tags %} + {% assign no_comma = forloop.last %} + {% for archive in site.archives %} + {% if archive.type == "tag" and archive.title == tag %} + {{ archive.title | escape }}{% unless no_comma %},{% endunless %} + {% endif %} + {% endfor %} + {% endfor %} +{% endif %} diff --git a/_includes/footer.html b/_includes/footer.html new file mode 100644 index 00000000..a2cbfa8b --- /dev/null +++ b/_includes/footer.html @@ -0,0 +1,6 @@ + diff --git a/_includes/head.html b/_includes/head.html new file mode 100644 index 00000000..2de27189 --- /dev/null +++ b/_includes/head.html @@ -0,0 +1,38 @@ + + + + + {% if page.title %}{{ page.title }} - {% endif %}{{ site.title }} + + + {% capture description %}{% if page.description %}{{ page.description }}{% else %}{{ content | raw_content }}{% endif %}{% endcapture %} + + {% if page.keywords %}{% endif %} + + + + + + {% capture canonical %}{{ site.url }}{% if site.permalink contains '.html' %}{{ page.url }}{% else %}{{ page.url | remove:'index.html' | strip_slash }}{% endif %}{% endcapture %} + + + + + + + + + + + + + + + + diff --git a/_includes/header.html b/_includes/header.html new file mode 100644 index 00000000..c46c5e94 --- /dev/null +++ b/_includes/header.html @@ -0,0 +1,30 @@ +
+
+ + + + {% if site.subscribe_rss %} + + {% endif %} + + {% if site.twitter_user %} + + {% endif %} + + {% if site.github_repo %} + + {% endif %} + +
Get Updates:   Via Atom  On Twitter  On GitHub
+
+ +
+

+ + {{ site.title }} +

+ {% if site.subtitle %} +

{{ site.subtitle }}

+ {% endif %} +
+
diff --git a/_includes/navigation.html b/_includes/navigation.html new file mode 100644 index 00000000..98c9f2ad --- /dev/null +++ b/_includes/navigation.html @@ -0,0 +1,32 @@ + diff --git a/_includes/post/author.html b/_includes/post/author.html new file mode 100644 index 00000000..83dd6a89 --- /dev/null +++ b/_includes/post/author.html @@ -0,0 +1,8 @@ +{% if post.author %} + {% assign author = post.author %} +{% elsif page.author %} + {% assign author = page.author %} +{% else %} + {% assign author = site.author %} +{% endif %} +{% if author %}Posted by {{ author }}{% endif %} diff --git a/_includes/post/categories.html b/_includes/post/categories.html new file mode 100644 index 00000000..80becd66 --- /dev/null +++ b/_includes/post/categories.html @@ -0,0 +1,9 @@ +{% if post.categories != empty or post.tags != empty or page.categories != empty or page.tags != empty %} + + {% if post %} + {% include category_links.html categories=post.categories tags=post.tags %} + {% else %} + {% include category_links.html categories=page.categories tags=page.tags %} + {% endif %} + +{% endif %} diff --git a/_includes/post/date.html b/_includes/post/date.html new file mode 100644 index 00000000..d8f67d46 --- /dev/null +++ b/_includes/post/date.html @@ -0,0 +1,23 @@ +{% capture date %}{{ page.date }}{{ post.date }}{% endcapture %} +{% capture date_formatted %} +{% unless post.date %} +{% assign d = page.date | date: "%-d" %}{{ page.date | date: "%B" }} {% case d %}{% when '1' or '21' or '31' %}{{ d }}st{% when '2' or '22' %}{{ d }}nd{% when '3' or '23' %}{{ d }}rd{% else %}{{ d }}th{% endcase %}, {{ page.date | date: "%Y" }} +{% else %} +{% assign d = post.date | date: "%-d" %}{{ post.date | date: "%B" }} {% case d %}{% when '1' or '21' or '31' %}{{ d }}st{% when '2' or '22' %}{{ d }}nd{% when '3' or '23' %}{{ d }}rd{% else %}{{ d }}th{% endcase %}, {{ post.date | date: "%Y" }} +{% endunless %} +{% endcapture %} +{% capture has_date %}{{ date | size }}{% endcapture %} + +{% capture updated %}{{ page.updated }}{{ post.updated }}{% endcapture %} +{% capture updated_formatted %}{{ page.updated_formatted }}{{ post.updated_formatted }}{% endcapture %} +{% capture was_updated %}{{ updated | size }}{% endcapture %} + +{% if has_date != '0' %} + {% capture time %}{% endcapture %} +{% endif %} + +{% if was_updated != '0' %} + {% capture updated %}{% endcapture %} +{% else %}{% assign updated = false %}{% endif %} + +{{ post.date_formatted }} diff --git a/_includes/post/sharing.html b/_includes/post/sharing.html new file mode 100644 index 00000000..1e6ddfb3 --- /dev/null +++ b/_includes/post/sharing.html @@ -0,0 +1,21 @@ +{% if post.title %} + {% assign title = post.title %} +{% elsif page.title %} + {% assign title = page.title %} +{% else %} + {% assign title = site.title %} +{% endif %} +{% if post.url %} + {% assign url = post.url %} +{% elsif page.url %} + {% assign url = page.url %} +{% else %} + {% assign url = site.url %} +{% endif %} +
+
+ + + + +
diff --git a/_includes/sidebar.html b/_includes/sidebar.html new file mode 100644 index 00000000..32fd7c6d --- /dev/null +++ b/_includes/sidebar.html @@ -0,0 +1,19 @@ +{% unless page.sidebar == false %} + +{% endunless %} diff --git a/_layouts/advisory.html b/_layouts/advisory.html new file mode 100644 index 00000000..0b9f6508 --- /dev/null +++ b/_layouts/advisory.html @@ -0,0 +1,183 @@ +--- +layout: post +--- + +

ADVISORIES

+ + + +

GEM

+ +

+{{ page.advisory.gem }} +

+ +{% if page.advisory.library %} +

LIBRARY

+ +

+{% if page.advisory.library == "rubygems" %} + RubyGems +{% else %} + {{ page.advisory.library }} +{% endif %} +

+{% endif %} + +{% if page.advisory.framework %} +

FRAMEWORK

+ +

+{% if page.advisory.framework == "rails" %} + Ruby on Rails +{% else %} + {{ page.advisory.framework }} +{% endif %} +

+{% endif %} + +{% if page.advisory.platform %} +

PLATFORM

+ +

+{% if page.advisory.platform == "goruby" %} + GoRuby +{% elsif page.advisory.platform == "ironruby" %} + IronRuby +{% elsif page.advisory.platform == "jruby" %} + JRuby +{% elsif page.advisory.platform == "macruby" %} + MacRuby +{% elsif page.advisory.platform == "maglev" %} + MagLev +{% elsif page.advisory.platform == "rbx" or page.advisory.platform == "rubinius" %} + Rubinius +{% elsif page.advisory.platform == "ree" %} + Ruby Enterprise Edition +{% else %} + {{ page.advisory.platform }} +{% endif %} +

+{% endif %} + +{% if page.advisory.cvss_v2 or page.advisory.cvss_v3 %} +

SEVERITY

+ +{% if page.advisory.cvss_v3 %} +{% assign cvss_v3 = page.advisory.cvss_v3 %} +

CVSS v3.x: {{ cvss_v3 }} ( + {%- if cvss_v3 == 0.0 -%} + None + {%- elsif cvss_v3 >= 0.1 and cvss_v3 <= 3.9 -%} + Low + {%- elsif cvss_v3 >= 4.0 and cvss_v3 <= 6.9 -%} + Medium + {%- elsif cvss_v3 >= 7.0 and cvss_v3 <= 8.9 -%} + High + {%- elsif cvss_v3 >= 9.0 and cvss_v3 <= 10.0 -%} + Critical + {%- endif -%} +)

+{% endif %} +{% if page.advisory.cvss_v2 %} +{% assign cvss_v2 = page.advisory.cvss_v2 %} +

CVSS v2.0: {{ cvss_v2 }} ( + {%- if cvss_v2 >= 0.0 and cvss_v2 <= 3.9 -%} + Low + {%- elsif cvss_v2 >= 4.0 and cvss_v2 <= 6.9 -%} + Medium + {%- elsif cvss_v2 >= 7.0 and cvss_v2 <= 10.0 -%} + High + {%- endif -%} +)

+{% endif %} +{% endif %} + +{% if page.advisory.unaffected_versions %} +

UNAFFECTED VERSIONS

+ + +{% endif %} + +

PATCHED VERSIONS

+ +{% if page.advisory.patched_versions %} + +{% else %} +

None.

+{% endif %} + +

DESCRIPTION

+ +{{ page.advisory.description | xml_escape | markdownify }} + +{% if page.advisory.related %} +

RELATED

+ + +{% endif %} diff --git a/_layouts/category_index.html b/_layouts/category_index.html new file mode 100644 index 00000000..85a63072 --- /dev/null +++ b/_layouts/category_index.html @@ -0,0 +1,17 @@ +--- +layout: page +footer: false +--- + +
+{% for post in site.categories[page.category] %} +{% capture this_year %}{{ post.date | date: "%Y" }}{% endcapture %} +{% unless year == this_year %} + {% assign year = this_year %} +

{{ year }}

+{% endunless %} +
+ {% include archive_post.html %} +
+{% endfor %} +
diff --git a/_layouts/default.html b/_layouts/default.html new file mode 100644 index 00000000..1d04d6d9 --- /dev/null +++ b/_layouts/default.html @@ -0,0 +1,19 @@ +{% capture root_url %}{% if site.baseurl != '/' %}{{ site.baseurl }}{% endif %}{% endcapture %} +{% include head.html %} + + +
+
+ {% include header.html %} + {% include navigation.html %} +
+
+
+ {{ content | expand_urls: root_url }} +
+
+ + {% include after_footer.html %} +
+ + diff --git a/_layouts/page.html b/_layouts/page.html new file mode 100644 index 00000000..9909d11d --- /dev/null +++ b/_layouts/page.html @@ -0,0 +1,42 @@ +--- +layout: default +--- + +
+ {% if page.sidebar and site.sidebar_posn == "left" %} + {% include sidebar.html %} + {% endif %} +
+ {% if page.title %} + + {% endif %} + + {{ content }} + + {% unless page.footer == false %} +
+ {% if page.date or page.author %}

+ {% if page.author %}{% include post/author.html %}{% endif %} + {% include post/date.html %}{% if updated %}{{ updated }}{% else %}{{ time }}{% endif %} + {% if page.categories %}{% include post/categories.html %}{% endif %} +

{% endif %} + {% unless page.sharing == false %} + {% include post/sharing.html %} + {% endunless %} +
+ {% endunless %} + + {% if site.disqus_short_name and page.comments == true %} +
+

Comments

+
{% include post/disqus_thread.html %}
+
+ {% endif %} +
+ {% if page.sidebar and site.sidebar_posn != "left" %} + {% include sidebar.html %} + {% endif %} +
diff --git a/_layouts/post.html b/_layouts/post.html new file mode 100644 index 00000000..79dbcd0c --- /dev/null +++ b/_layouts/post.html @@ -0,0 +1,36 @@ +--- +layout: default +single: true +# page.sidebar is not necessarily set for pages - assume true if not set +--- + +
+ {% if page.sidebar != false and site.sidebar_posn == "left" %} + {% include sidebar.html %} + {% endif %} +
+ {% include article.html %} + +
+ + {% if page.sidebar != false and site.sidebar_posn != "left" %} + {% include sidebar.html %} + {% endif %} +
diff --git a/advisories/_posts/2006-05-14-CVE-2006-2581.md b/advisories/_posts/2006-05-14-CVE-2006-2581.md new file mode 100644 index 00000000..1348a39c --- /dev/null +++ b/advisories/_posts/2006-05-14-CVE-2006-2581.md @@ -0,0 +1,46 @@ +--- +layout: advisory +title: 'CVE-2006-2581 (rwiki): RWiki before 2.1.1 has cross-site scripting vulnerability' +comments: false +categories: +- rwiki +advisory: + gem: rwiki + cve: 2006-2581 + ghsa: gvhx-gj42-m28v + url: https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html + title: RWiki before 2.1.1 has cross-site scripting vulnerability + date: 2006-05-14 + description: | + Cross-site scripting (XSS) vulnerability in Wiki content in + RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to inject + arbitrary web script or HTML via unknown attack vectors. + cvss_v2: 4.3 + unaffected_versions: + - "< 2.1.0pre1" + patched_versions: + - ">= 2.1.1" + related: + cve: + - 2006-2582 + ghsa: + - wwmf-6p58-6vj2 + url: + - https://nvd.nist.gov/vuln/detail/CVE-2006-2581 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/26664 + - https://github.com/advisories/GHSA-wwmf-6p58-6vj2 + - https://github.com/advisories/GHSA-gvhx-gj42-m28v + - https://rubygems.org/gems/rwiki + - https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html + - https://web.archive.org/web/20090504061152/http://pub.cozmixng.org/~the-rwiki/rw-cgi.rb?cmd=view;name=top + - https://web.archive.org/web/20081201080215/http://secunia.com/advisories/20264 + - https://web.archive.org/web/20090524010623/http://www.vupen.com/english/advisories/2006/1949 + notes: | + - Best references are in Japanese. + - Source code link on rubygems.org goes to + lucassus/rwiki (last version 0.2.5, not 2.1.1). + - Found two other repos: + - https://github.com/rwiki/rwiki + - https://github.com/ytakhs/rwiki + - CWE: [NVD-CWE-Other] MODERATE +--- diff --git a/advisories/_posts/2006-05-14-CVE-2006-2582.md b/advisories/_posts/2006-05-14-CVE-2006-2582.md new file mode 100644 index 00000000..9b39c62f --- /dev/null +++ b/advisories/_posts/2006-05-14-CVE-2006-2582.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2006-2582 (rwiki): High severity vulnerability that affects rwiki' +comments: false +categories: +- rwiki +advisory: + gem: rwiki + cve: 2006-2582 + ghsa: wwmf-6p58-6vj2 + url: https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html + title: High severity vulnerability that affects rwiki + date: 2006-05-14 + description: | + The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote + attackers to execute arbitrary Ruby code via unknown attack vectors. + cvss_v2: 7.5 + unaffected_versions: + - "< 2.1.0pre1" + patched_versions: + - ">= 2.1.1" + related: + cve: + - 2006-2581 + ghsa: + - gvhx-gj42-m28v + url: + - https://nvd.nist.gov/vuln/detail/CVE-2006-2582 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/26664 + - https://github.com/advisories/GHSA-wwmf-6p58-6vj2 + - https://github.com/advisories/GHSA-gvhx-gj42-m28v + - https://rubygems.org/gems/rwiki + - https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html + - https://web.archive.org/web/20090504061152/http://pub.cozmixng.org/~the-rwiki/rw-cgi.rb?cmd=view;name=top + - https://web.archive.org/web/20081201080215/http://secunia.com/advisories/20264 + - https://web.archive.org/web/20090524010623/http://www.vupen.com/english/advisories/2006/1949 + notes: | + - Best references are in Japanese. + - Source code link on rubygems.org goes to + lucassus/rwiki (last version 0.2.5, not 2.1.1). + - Found two other repos: + - https://github.com/rwiki/rwiki + - https://github.com/ytakhs/rwiki + - CWE: [NVD-CWE-Other] MODERATE +--- diff --git a/advisories/_posts/2007-01-22-CVE-2007-0469.md b/advisories/_posts/2007-01-22-CVE-2007-0469.md new file mode 100644 index 00000000..1dd3975d --- /dev/null +++ b/advisories/_posts/2007-01-22-CVE-2007-0469.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2007-0469 (rubygems-update): CVE-2007-0469 RubyGems: Specially-crafted + Gem archive can overwrite system files' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2007-0469 + osvdb: 33561 + ghsa: 95vx-q4c2-64gr + url: https://nvd.nist.gov/vuln/detail/CVE-2007-0469 + title: 'CVE-2007-0469 RubyGems: Specially-crafted Gem archive can overwrite system + files' + date: 2007-01-22 + description: | + The extract_files function in installer.rb in RubyGems before 0.9.1 does + not check whether files exist before overwriting them, which allows user-assisted + remote attackers to overwrite arbitrary files, cause a denial of service, or execute + arbitrary code via crafted GEM packages. + cvss_v2: 9.3 + patched_versions: + - ">= 0.9.1" +--- diff --git a/advisories/_posts/2007-05-21-OSVDB-101157.md b/advisories/_posts/2007-05-21-OSVDB-101157.md new file mode 100644 index 00000000..df4b2e1f --- /dev/null +++ b/advisories/_posts/2007-05-21-OSVDB-101157.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-101157 (json): json Gem for Ruby Data Handling Stack Buffer Overflow' +comments: false +categories: +- json +advisory: + gem: json + osvdb: 101157 + url: https://security.snyk.io/vuln/SNYK-RUBY-JSON-20000 + title: json Gem for Ruby Data Handling Stack Buffer Overflow + date: 2007-05-21 + description: | + json Gem for Ruby contains an overflow condition that is triggered as + user-supplied input is not properly validated when handling specially crafted + data. This may allow a remote attacker to cause a stack-based buffer + overflow, resulting in a denial of service or potentially allowing the + execution of arbitrary code. + patched_versions: + - ">= 1.1.0" + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-JSON-20000 + - http://osvdb.org/show/osvdb/101157 +--- diff --git a/advisories/_posts/2007-06-15-OSVDB-95668.md b/advisories/_posts/2007-06-15-OSVDB-95668.md new file mode 100644 index 00000000..8b889e36 --- /dev/null +++ b/advisories/_posts/2007-06-15-OSVDB-95668.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-95668 (builder): Builder Gem for Ruby Tag Name Handling Private Method + Exposure' +comments: false +categories: +- builder +advisory: + gem: builder + osvdb: 95668 + url: https://my.diffend.io/gems/builder/2.1.1/2.1.2 + title: Builder Gem for Ruby Tag Name Handling Private Method Exposure + date: 2007-06-15 + description: | + Builder Gem for Ruby contains a flaw in the handling of tag names. The issue + is triggered when the program reads tag names from XML data and then calls a + method with that name. With a specially crafted file, a context-dependent + attacker can call private methods and manipulate data. + patched_versions: + - ">= 2.1.2" + related: + url: + - https://my.diffend.io/gems/builder/2.1.1/2.1.2 + - http://osvdb.org/show/osvdb/95668 +--- diff --git a/advisories/_posts/2007-11-27-CVE-2007-6183.md b/advisories/_posts/2007-11-27-CVE-2007-6183.md new file mode 100644 index 00000000..1a0ffd83 --- /dev/null +++ b/advisories/_posts/2007-11-27-CVE-2007-6183.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2007-6183 (gtk2): CVE-2007-6183 ruby-gnome2: format string vulnerability' +comments: false +categories: +- gtk2 +advisory: + gem: gtk2 + cve: 2007-6183 + osvdb: 40774 + ghsa: xgj6-pgrm-x4r2 + url: https://nvd.nist.gov/vuln/detail/CVE-2007-6183 + title: 'CVE-2007-6183 ruby-gnome2: format string vulnerability' + date: 2007-11-27 + description: | + Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c + in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows + context-dependent attackers to execute arbitrary code via format string specifiers + in the message parameter. + cvss_v2: 6.8 + patched_versions: + - "> 0.16.0" +--- diff --git a/advisories/_posts/2008-08-12-CVE-2008-7311.md b/advisories/_posts/2008-08-12-CVE-2008-7311.md new file mode 100644 index 00000000..716d1cd7 --- /dev/null +++ b/advisories/_posts/2008-08-12-CVE-2008-7311.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2008-7311 (spree): Spree Hardcoded config.action_controller_session Hash + Value Cryptographic Protection Weakness' +comments: false +categories: +- spree +advisory: + gem: spree + cve: 2008-7311 + osvdb: 81506 + ghsa: g466-57gh-cqfw + url: https://spreecommerce.com/blog/security-vulernability-session-cookie-store + title: Spree Hardcoded config.action_controller_session Hash Value Cryptographic + Protection Weakness + date: 2008-08-12 + description: | + Spree contains a hardcoded flaw related to the + config.action_controller_session hash value. This may allow an attacker to + more easily bypass cryptographic protection. + cvss_v2: 5.0 + patched_versions: + - ">= 0.3.0" +--- diff --git a/advisories/_posts/2008-08-15-OSVDB-95749.md b/advisories/_posts/2008-08-15-OSVDB-95749.md new file mode 100644 index 00000000..8a250277 --- /dev/null +++ b/advisories/_posts/2008-08-15-OSVDB-95749.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-95749 (activeresource): activeresource Gem for Ruby lib/active_resource/connection.rb + request Function Multiple Variable Format String' +comments: false +categories: +- activeresource +advisory: + gem: activeresource + osvdb: 95749 + url: https://my.diffend.io/gems/activeresource/versions/2.1.0 + title: activeresource Gem for Ruby lib/active_resource/connection.rb request Function + Multiple Variable Format String + date: 2008-08-15 + description: | + activeresource contains a format string flaw in the request function of + lib/active_resource/connection.rb. The issue is triggered as format string + specifiers (e.g. %s and %x) are not properly sanitized in user-supplied input + when passed via the 'result.code' and 'result.message' variables. This may + allow a remote attacker to cause a denial of service or potentially execute + arbitrary code. + patched_versions: + - ">= 2.2.0" + related: + url: + - https://my.diffend.io/gems/activeresource/versions/2.1.0 + - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERESOURCE-20004 + - http://osvdb.org/show/osvdb/95749 +--- diff --git a/advisories/_posts/2008-09-22-CVE-2008-7310.md b/advisories/_posts/2008-09-22-CVE-2008-7310.md new file mode 100644 index 00000000..fc68fd35 --- /dev/null +++ b/advisories/_posts/2008-09-22-CVE-2008-7310.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2008-7310 (spree): Spree Hash Restriction Weakness URL Parsing Order State + Value Manipulation' +comments: false +categories: +- spree +advisory: + gem: spree + cve: 2008-7310 + osvdb: 81505 + ghsa: 7h48-m3rw-vr27 + url: https://spreecommerce.com/blog/security-vulnerability-mass-assignment + title: Spree Hash Restriction Weakness URL Parsing Order State Value Manipulation + date: 2008-09-22 + description: | + Spree contains a hash restriction weakness that occurs when parsing a + modified URL. This may allow an attacker to manipulate order state values. + cvss_v2: 5.0 + patched_versions: + - ">= 0.3.0" +--- diff --git a/advisories/_posts/2008-10-10-OSVDB-95376.md b/advisories/_posts/2008-10-10-OSVDB-95376.md new file mode 100644 index 00000000..c57a2f91 --- /dev/null +++ b/advisories/_posts/2008-10-10-OSVDB-95376.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-95376 (activerecord-oracle_enhanced-adapter): Oracle "enhanced" ActiveRecord + Gem for Ruby :limit / :offset SQL Injection' +comments: false +categories: +- activerecord-oracle_enhanced-adapter +advisory: + gem: activerecord-oracle_enhanced-adapter + osvdb: 95376 + url: https://www.versioneye.com/Ruby/activerecord-oracle_enhanced-adapter/1.1.6 + title: Oracle "enhanced" ActiveRecord Gem for Ruby :limit / :offset SQL Injection + date: 2008-10-10 + description: | + Oracle "enhanced" ActiveRecord Gem for Ruby contains a flaw that may allow an + attacker to carry out an SQL injection attack. The issue is due to the + program not properly sanitizing user-supplied input related to the :limit and + :offset functions. This may allow an attacker to inject or manipulate SQL + queries in the back-end database, allowing for the manipulation or disclosure + of arbitrary data. + patched_versions: + - ">= 1.1.8" + related: + url: + - https://www.versioneye.com/Ruby/activerecord-oracle_enhanced-adapter/1.1.6 + - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDORACLEENHANCEDADAPTER-20006 + - http://osvdb.org/show/osvdb/95376 +--- diff --git a/advisories/_posts/2008-12-08-CVE-2008-4310.md b/advisories/_posts/2008-12-08-CVE-2008-4310.md new file mode 100644 index 00000000..60c093ed --- /dev/null +++ b/advisories/_posts/2008-12-08-CVE-2008-4310.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2008-4310 (webrick): WEBrick Denial of Service Vulnerability' +comments: false +categories: +- webrick +advisory: + gem: webrick + cve: 2008-4310 + ghsa: wfrc-r6c6-7j9r + url: https://bugzilla.redhat.com/show_bug.cgi?id=470252 + title: WEBrick Denial of Service Vulnerability + date: 2008-12-08 + description: | + httputils.rb in WEBrick in Ruby 1.8.1 and 1.8.5, as used in Red Hat + Enterprise Linux 4 and 5, allows remote attackers to cause a + denial of service (CPU consumption) via a crafted HTTP request. + + NOTE: This issue exists because of an incomplete fix for CVE-2008-3656. + cvss_v2: 7.8 + patched_versions: + - ">= 1.3.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2008-4310 + - https://github.com/ruby/webrick/commit/b2ccd5ff7ddd67a4548299e110dcc5a4728a5534 + - http://www.openwall.com/lists/oss-security/2008/12/04/2 + - https://bugzilla.redhat.com/show_bug.cgi?id=470252 + - https://oval.cisecurity.org/repository/search/definition/oval + - http://www.redhat.com/support/errata/RHSA-2008-0981.html + - https://web.archive.org/web/20111230125610/http://secunia.com/advisories/33013 + - https://github.com/advisories/GHSA-wfrc-r6c6-7j9r +--- diff --git a/advisories/_posts/2009-07-10-CVE-2009-2422.md b/advisories/_posts/2009-07-10-CVE-2009-2422.md new file mode 100644 index 00000000..4bdfc104 --- /dev/null +++ b/advisories/_posts/2009-07-10-CVE-2009-2422.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2009-2422 (rails): High Security Vulnerability with authenticate_with_http_digest + of Rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2009-2422 + ghsa: rxq3-gm4p-5fj4 + url: http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest + title: High Security Vulnerability with authenticate_with_http_digest of Rails + date: 2009-07-10 + description: | + The example code for the digest authentication functionality + (http_authentication.rb) in Ruby on Rails before 2.3.3 defines + an authenticate_or_request_with_http_digest block that returns + nil instead of false when the user does not exist, which allows + context-dependent attackers to bypass authentication for + applications that are derived from this example by sending an + invalid username without a password. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 2.3.3" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-2422 + - http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest + - https://lists.apple.com/archives/security-announce/2010/Mar/msg00001.html + - https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 + - http://support.apple.com/kb/HT4077 + - http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s + - https://github.com/advisories/GHSA-rxq3-gm4p-5fj4 +--- diff --git a/advisories/_posts/2009-12-07-CVE-2009-4123.md b/advisories/_posts/2009-12-07-CVE-2009-4123.md new file mode 100644 index 00000000..499a616a --- /dev/null +++ b/advisories/_posts/2009-12-07-CVE-2009-4123.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2009-4123 (jruby-openssl): jruby-openssl Gem for JRuby fails to do proper + certificate validation' +comments: false +categories: +- jruby-openssl +- jruby +advisory: + gem: jruby-openssl + platform: jruby + cve: 2009-4123 + ghsa: xgv7-pqqh-h2w9 + url: http://jruby.org/2009/12/07/vulnerability-in-jruby-openssl + title: jruby-openssl Gem for JRuby fails to do proper certificate validation + date: 2009-12-07 + description: | + A security problem involving peer certificate verification was found where + failed verification silently did nothing, making affected applications + vulnerable to attackers. Attackers could lead a client application to believe + that a secure connection to a rogue SSL server is legitimate. Attackers could + also penetrate client-validated SSL server applications with a dummy + certificate. + cvss_v3: 7.5 + patched_versions: + - ">= 0.6" +--- diff --git a/advisories/_posts/2010-02-01-OSVDB-62067.md b/advisories/_posts/2010-02-01-OSVDB-62067.md new file mode 100644 index 00000000..7b414abe --- /dev/null +++ b/advisories/_posts/2010-02-01-OSVDB-62067.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'OSVDB-62067 (bcrypt): bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII + characters (JRuby only)' +comments: false +categories: +- bcrypt +- jruby +advisory: + gem: bcrypt + platform: jruby + osvdb: 62067 + url: http://www.mindrot.org/files/jBCrypt/internat.adv + title: bcrypt-ruby Gem for Ruby incorrect encoding of non US-ASCII characters (JRuby + only) + date: 2010-02-01 + description: | + In https://security.snyk.io/vuln/SNYK-RUBY-BCRYPT-20009, found + "The advisory has been revoked - it doesn't affect any version of package bcrypt" + + bcrypt-ruby Gem for Ruby suffered from a bug related to character + encoding that substantially reduced the entropy of hashed passwords + containing non US-ASCII characters. An incorrect encoding step + transparently replaced such characters by '?' prior to hashing. + In the worst case of a password consisting solely of non-US-ASCII + characters, this would cause its hash to be equivalent to all other + such passwords of the same length. + + This issue only affects the JRuby implementation. + patched_versions: + - ">= 2.1.4" + related: + url: + - https://github.com/jeremyh/jBCrypt + - http://www.mindrot.org/files/jBCrypt/internat.adv + - https://github.com/bcrypt-ruby/bcrypt-ruby/blob/master/ext/jruby/bcrypt_jruby/BCrypt.java +--- diff --git a/advisories/_posts/2010-04-27-OSVDB-110439.md b/advisories/_posts/2010-04-27-OSVDB-110439.md new file mode 100644 index 00000000..b3828ec5 --- /dev/null +++ b/advisories/_posts/2010-04-27-OSVDB-110439.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-110439 (fog-dragonfly): Dragonfly Gem for Ruby Image Uploading & Processing + Remote Command Execution' +comments: false +categories: +- fog-dragonfly +advisory: + gem: fog-dragonfly + osvdb: 110439 + url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193 + title: Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution + date: 2010-04-27 + description: | + Dragonfly Gem for Ruby contains a flaw in Uploading & Processing + that is due to the gem failing to restrict arbitrary commands to + imagemagicks convert. This may allow a remote attacker to gain + read/write access to the filesystem and execute arbitrary commands. + + This gem has been renamed. Please use "dragonfly" from now on. + patched_versions: + - ">= 0.8.4" + related: + url: + - https://github.com/markevans/dragonfly/compare/v0.8.3...v0.8.4 + - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193 + - https://www.mend.io/vulnerability-database/WS-2014-0016 + - http://osvdb.org/show/osvdb/110439 +--- diff --git a/advisories/_posts/2010-08-12-OSVDB-114600.md b/advisories/_posts/2010-08-12-OSVDB-114600.md new file mode 100644 index 00000000..5ba2b8c1 --- /dev/null +++ b/advisories/_posts/2010-08-12-OSVDB-114600.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-114600 (curb): curb Gem for Ruby Empty http_put Body Handling Remote + DoS' +comments: false +categories: +- curb +advisory: + gem: curb + osvdb: 114600 + url: https://my.diffend.io/gems/curb/versions/0.6.4.0 + title: curb Gem for Ruby Empty http_put Body Handling Remote DoS + date: 2010-08-12 + description: | + curb Gem for Ruby contains a flaw that is triggered when handling + an empty http_put body. This may allow a remote attacker to crash + an application linked against the library. + patched_versions: + - ">= 0.7.8" + related: + url: + - https://my.diffend.io/gems/curb/versions/0.6.4.0 + - https://my.diffend.io/gems/curb/0.7.7.1/0.7.8 + - http://osvdb.org/show/osvdb/114600 +--- diff --git a/advisories/_posts/2010-11-02-CVE-2010-3978.md b/advisories/_posts/2010-11-02-CVE-2010-3978.md new file mode 100644 index 00000000..d5d1f517 --- /dev/null +++ b/advisories/_posts/2010-11-02-CVE-2010-3978.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2010-3978 (spree): Spree Multiple Script JSON Request Validation Weakness + Remote Information Disclosure' +comments: false +categories: +- spree +advisory: + gem: spree + cve: 2010-3978 + osvdb: 69098 + ghsa: hwrx-wc75-mgh7 + url: https://spreecommerce.com/blog/json-hijacking-vulnerability + title: Spree Multiple Script JSON Request Validation Weakness Remote Information + Disclosure + date: 2010-11-02 + description: | + Spree contains a flaw that may lead to an unauthorized information + disclosure. The issue is triggered when the application exchanges data using + the JSON service without validating requests, which will disclose sensitive + user and order information to a context-dependent attacker when a logged-in + user visits a crafted website. + cvss_v2: 5.0 + patched_versions: + - "~> 0.11.2" + - ">= 0.30.0" +--- diff --git a/advisories/_posts/2011-01-12-OSVDB-106954.md b/advisories/_posts/2011-01-12-OSVDB-106954.md new file mode 100644 index 00000000..396e5517 --- /dev/null +++ b/advisories/_posts/2011-01-12-OSVDB-106954.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-106954 (quick_magick): quick_magick Gem for Ruby QuickMagick::Image.read + Function Crafted String Handling Remote Command Injection' +comments: false +categories: +- quick_magick +advisory: + gem: quick_magick + osvdb: 106954 + url: https://security.snyk.io/vuln/SNYK-RUBY-QUICKMAGICK-20012 + title: quick_magick Gem for Ruby QuickMagick::Image.read Function Crafted String + Handling Remote Command Injection + date: 2011-01-12 + description: | + quick_magick Gem for Ruby contains a flaw in the QuickMagick::Image.read + function. The issue is triggered when handling a specially crafted string. + This may allow a remote attacker to inject arbitrary commands. + notes: Never patched + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-QUICKMAGICK-20012 + - http://osvdb.org/show/osvdb/106954 +--- diff --git a/advisories/_posts/2011-01-25-CVE-2011-0739.md b/advisories/_posts/2011-01-25-CVE-2011-0739.md new file mode 100644 index 00000000..d176fbc5 --- /dev/null +++ b/advisories/_posts/2011-01-25-CVE-2011-0739.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2011-0739 (mail): Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb + Email From: Address Arbitrary Shell Command Injection' +comments: false +categories: +- mail +advisory: + gem: mail + cve: 2011-0739 + osvdb: 70667 + ghsa: cpjc-p7fc-j9xh + url: https://nvd.nist.gov/vuln/detail/CVE-2011-0739 + title: 'Mail Gem for Ruby lib/mail/network/delivery_methods/sendmail.rb Email From: + Address Arbitrary Shell Command Injection' + date: 2011-01-25 + description: | + Mail Gem for Ruby contains a flaw related to the failure to properly sanitise + input passed from an email from address in the 'deliver()' function in + 'lib/mail/network/delivery_methods/sendmail.rb' before being used as a + command line argument. This may allow a remote attacker to inject arbitrary + shell commands. + cvss_v2: 6.8 + patched_versions: + - ">= 2.2.15" +--- diff --git a/advisories/_posts/2011-04-19-OSVDB-73751.md b/advisories/_posts/2011-04-19-OSVDB-73751.md new file mode 100644 index 00000000..d897a11b --- /dev/null +++ b/advisories/_posts/2011-04-19-OSVDB-73751.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'OSVDB-73751 (spree): Spree Content Controller Unspecified Arbitrary File Disclosure' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 73751 + url: https://web.archive.org/web/20160331142302/https://spreecommerce.com/blog/security-fixes + title: Spree Content Controller Unspecified Arbitrary File Disclosure + date: 2011-04-19 + description: | + Spree Gem for Ruby would allow a user to request a specially crafted URL and + expose arbitrary files on the server + patched_versions: + - ">= 0.50.1" + related: + url: + - https://web.archive.org/web/20160331142302/https://spreecommerce.com/blog/security-fixes + - https://seclists.org/oss-sec/2015/q3/275 + - https://github.com/spree/spree/commit/0a2ee5fc68b22b8257e8a6cf1811598293416d33 +--- diff --git a/advisories/_posts/2011-05-13-CVE-2011-0995.md b/advisories/_posts/2011-05-13-CVE-2011-0995.md new file mode 100644 index 00000000..29819acc --- /dev/null +++ b/advisories/_posts/2011-05-13-CVE-2011-0995.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2011-0995 (sqlite3-ruby): rubygem-sqlite3 gem uses weak file permissions' +comments: false +categories: +- sqlite3-ruby +advisory: + gem: sqlite3-ruby + cve: 2011-0995 + ghsa: 6x46-7rrv-m4h8 + osvdb: 72180 + url: https://www.suse.com/security/cve/CVE-2011-0995.html + title: rubygem-sqlite3 gem uses weak file permissions + date: 2011-05-13 + description: | + The sqlite3-ruby gem in the rubygem-sqlite3 package before + 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak + permissions for unspecified files, which allows local users + to gain privileges via unknown vectors. + cvss_v2: 2.1 + patched_versions: + - ">= 1.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0995 + - https://www.suse.com/security/cve/CVE-2011-0995.html + - http://www.osvdb.org/72180 + - https://github.com/advisories/GHSA-6x46-7rrv-m4h8 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/67263 + - https://ubuntu.com/security/CVE-2011-0995 + - https://cve.circl.lu/cve/CVE-2011-0995 +--- diff --git a/advisories/_posts/2011-08-16-CVE-2011-3186.md b/advisories/_posts/2011-08-16-CVE-2011-3186.md new file mode 100644 index 00000000..33e69265 --- /dev/null +++ b/advisories/_posts/2011-08-16-CVE-2011-3186.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2011-3186 (actionpack): Response Splitting Vulnerability in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-3186 + osvdb: 74616 + ghsa: fcqf-h4h4-695m + url: https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g + title: Response Splitting Vulnerability in Ruby on Rails + date: 2011-08-16 + description: | + A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow + a remote attacker to inject arbitrary HTTP headers into a response due to + insufficient sanitization of the values provided for response content types. + cvss_v2: 4.3 + patched_versions: + - ">= 2.3.13" +--- diff --git a/advisories/_posts/2011-09-01-CVE-2011-4969.md b/advisories/_posts/2011-09-01-CVE-2011-4969.md new file mode 100644 index 00000000..c559be29 --- /dev/null +++ b/advisories/_posts/2011-09-01-CVE-2011-4969.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2011-4969 (jquery-rails): jQuery vulnerable to Cross-Site Scripting (XSS)' +comments: false +categories: +- jquery-rails +advisory: + gem: jquery-rails + cve: 2011-4969 + ghsa: 579v-mp3v-rrw5 + url: http://blog.jquery.com/2011/09/01/jquery-1-6-3-released + title: jQuery vulnerable to Cross-Site Scripting (XSS) + date: 2011-09-01 + description: | + Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, + when using location.hash to select elements, allows remote attackers + to inject arbitrary web script or HTML via a crafted tag. + cvss_v2: 4.3 + patched_versions: + - ">= 1.6.3" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-4969 + - http://blog.jquery.com/2011/09/01/jquery-1-6-3-released + - http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html + - http://bugs.jquery.com/ticket/9521 + - https://github.com/jquery/jquery/commit/db9e023e62c1ff5d8f21ed9868ab6878da2005e9 + - https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8 + - https://security.netapp.com/advisory/ntap-20190416-0007 + - http://www.openwall.com/lists/oss-security/2013/01/31/3 + - http://www.ubuntu.com/usn/USN-1722-1 + - https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450224 + - https://github.com/advisories/GHSA-579v-mp3v-rrw5 +--- diff --git a/advisories/_posts/2011-09-01-OSVDB-97854.md b/advisories/_posts/2011-09-01-OSVDB-97854.md new file mode 100644 index 00000000..966b9313 --- /dev/null +++ b/advisories/_posts/2011-09-01-OSVDB-97854.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'OSVDB-97854 (fog-dragonfly): Dragonfly Gem for Ruby on Windows Shell Escaping + Weakness' +comments: false +categories: +- fog-dragonfly +advisory: + gem: fog-dragonfly + osvdb: 97854 + url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20016 + title: Dragonfly Gem for Ruby on Windows Shell Escaping Weakness + date: 2011-09-01 + description: | + Dragonfly Gem for Ruby contains a flaw that is due to the program + failing to properly escape a shell that contains injected characters. + This may allow a context-dependent attacker to potentially execute + arbitrary commands. + + This gem has been renamed. Please use "dragonfly" from now on. + patched_versions: + - ">= 0.9.6" + related: + url: + - https://github.com/markevans/dragonfly/blob/master/spec/dragonfly/shell_spec.rb#L26 + - https://github.com/markevans/dragonfly/pull/506 + - https://github.com/markevans/dragonfly/commit/f4f8e37a171a34f0ef3a6d80b52f44ed4d66d3bc + - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20016 + - http://osvdb.org/show/osvdb/97854 +--- diff --git a/advisories/_posts/2011-09-20-OSVDB-115917.md b/advisories/_posts/2011-09-20-OSVDB-115917.md new file mode 100644 index 00000000..17611972 --- /dev/null +++ b/advisories/_posts/2011-09-20-OSVDB-115917.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-115917 (bundler): Bundler Gem for Ruby install Command Process Listing + Local Plaintext Credential Disclosure' +comments: false +categories: +- bundler +advisory: + gem: bundler + osvdb: 115917 + url: https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8 + title: Bundler Gem for Ruby install Command Process Listing Local Plaintext Credential + Disclosure + date: 2011-09-20 + description: | + Bundler Gem for Ruby contains a flaw that is due to the program listing + credential information in plaintext in the install command process listing. + This may allow a local attacker to gain access to credential information. + patched_versions: + - ">= 1.1.rc" + related: + url: + - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8 + - https://my.diffend.io/gems/bundler/versions/1.1.rc + - https://github.com/rubygems/bundler/commit/95bb14483cf8af857dc901c22db48cd3057d243e + - https://github.com/rubygems/bundler/pull/1463 + - https://github.com/rubygems/bundler/issues/1440 + - http://www.osvdb.org/show/osvdb/115917 +--- diff --git a/advisories/_posts/2011-10-05-OSVDB-76011.md b/advisories/_posts/2011-10-05-OSVDB-76011.md new file mode 100644 index 00000000..6dd9072c --- /dev/null +++ b/advisories/_posts/2011-10-05-OSVDB-76011.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-76011 (spree): Spree Search ProductScope Class search[send][] Parameter + Arbitrary Command Execution' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 76011 + url: https://web.archive.org/web/20121124215359/https://spreecommerce.com/blog/remote-command-product-group + title: Spree Search ProductScope Class search[send][] Parameter Arbitrary Command + Execution + date: 2011-10-05 + description: | + The ProductScope class fails to properly sanitize user-supplied input via the + 'search[send][]' parameter resulting in arbitrary command execution. With a + specially crafted request, a remote attacker can potentially cause arbitrary + command execution. + patched_versions: + - ">= 0.60.2" + related: + url: + - https://web.archive.org/web/20121124215359/https://spreecommerce.com/blog/remote-command-product-group +--- diff --git a/advisories/_posts/2011-10-27-CVE-2011-3870.md b/advisories/_posts/2011-10-27-CVE-2011-3870.md new file mode 100644 index 00000000..f5edf429 --- /dev/null +++ b/advisories/_posts/2011-10-27-CVE-2011-3870.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2011-3870 (puppet): Puppet allows local users to modify the permissions + of arbitrary files' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2011-3870 + ghsa: qh3g-27jf-3j54 + url: https://puppet.com/security/cve/cve-2011-3870 + title: Puppet allows local users to modify the permissions of arbitrary files + date: 2011-10-27 + description: | + Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x + allows local users to modify the permissions of arbitrary + files via a symlink attack on the SSH authorized_keys file. + cvss_v2: 6.3 + patched_versions: + - "~> 2.6.11" + - ">= 2.7.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-3870 + - https://puppet.com/security/cve/cve-2011-3870 + - https://github.com/puppetlabs/puppet/commit/88512e880bd2a03694b5fef42540dc7b3da05d30 + - https://github.com/puppetlabs/puppet/commit/b29b1785d543a3cea961fffa9b3c15f14ab7cce0 + - http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html + - http://www.debian.org/security/2011/dsa-2314 + - http://www.ubuntu.com/usn/USN-1223-1 + - http://www.ubuntu.com/usn/USN-1223-2 + - https://github.com/advisories/GHSA-qh3g-27jf-3j54 +--- diff --git a/advisories/_posts/2011-10-27-CVE-2011-3871.md b/advisories/_posts/2011-10-27-CVE-2011-3871.md new file mode 100644 index 00000000..3d0b7927 --- /dev/null +++ b/advisories/_posts/2011-10-27-CVE-2011-3871.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2011-3871 (puppet): Puppet uses predictable filenames, allowing arbitrary + file overwrite' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2011-3871 + ghsa: mpmx-gm5v-q789 + url: https://puppet.com/security/cve/cve-2011-3871 + title: Puppet uses predictable filenames, allowing arbitrary file overwrite + date: 2011-10-27 + description: | + Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, + when running in `--edit` mode, uses a predictable file name, which + allows local users to run arbitrary Puppet code or trick a user + into editing arbitrary files. + cvss_v2: 6.2 + patched_versions: + - "~> 2.6.11" + - ">= 2.7.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-3871 + - https://puppet.com/security/cve/cve-2011-3871 + - https://github.com/puppetlabs/puppet/commit/343c7bd381b63e042d437111718918f951d9b30d + - https://github.com/puppetlabs/puppet/commit/d76c30935460ded953792dfe49f72b8c5158e899 + - http://groups.google.com/group/puppet-announce/browse_thread/thread/91e3b46d2328a1cb + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068053.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068061.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068093.html + - http://www.debian.org/security/2011/dsa-2314 + - http://www.ubuntu.com/usn/USN-1223-1 + - http://www.ubuntu.com/usn/USN-1223-2 + - https://github.com/advisories/GHSA-mpmx-gm5v-q789 +--- diff --git a/advisories/_posts/2011-11-17-CVE-2011-4319.md b/advisories/_posts/2011-11-17-CVE-2011-4319.md new file mode 100644 index 00000000..7472fcce --- /dev/null +++ b/advisories/_posts/2011-11-17-CVE-2011-4319.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2011-4319 (actionpack): XSS vulnerability in the translate helper method + in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-4319 + osvdb: 77199 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/K2HXD7c8fMU + title: XSS vulnerability in the translate helper method in Ruby on Rails + date: 2011-11-17 + description: | + A cross-site scripting (XSS) flaw was found in the way the 'translate' helper + method of the Ruby on Rails performed HTML escaping of interpolated user + input, when interpolation in combination with HTML-safe translations were + used. A remote attacker could use this flaw to execute arbitrary HTML or web + script by providing a specially-crafted input to Ruby on Rails application, + using the ActionPack module and its 'translate' helper method without explicit + (application specific) sanitization of user provided input. + cvss_v2: 4.3 + patched_versions: + - "~> 3.0.11" + - ">= 3.1.2" +--- diff --git a/advisories/_posts/2011-12-28-CVE-2011-5036.md b/advisories/_posts/2011-12-28-CVE-2011-5036.md new file mode 100644 index 00000000..2ec8a99a --- /dev/null +++ b/advisories/_posts/2011-12-28-CVE-2011-5036.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2011-5036 (rack): CVE-2011-5036 rubygem-rack: hash table collisions DoS + (oCERT-2011-003)' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2011-5036 + osvdb: 78121 + ghsa: v6j3-7jrw-hq2p + url: https://nvd.nist.gov/vuln/detail/CVE-2011-5036 + title: 'CVE-2011-5036 rubygem-rack: hash table collisions DoS (oCERT-2011-003)' + date: 2011-12-28 + description: | + Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes + hash values for form parameters without restricting the ability to trigger hash + collisions predictably, which allows remote attackers to cause a denial of service + (CPU consumption) by sending many crafted parameters. + cvss_v2: 5.0 + patched_versions: + - "~> 1.1.3" + - "~> 1.2.5" + - "~> 1.3.6" + - ">= 1.4.0" +--- diff --git a/advisories/_posts/2012-02-01-CVE-2012-6135.md b/advisories/_posts/2012-02-01-CVE-2012-6135.md new file mode 100644 index 00000000..1c7d271c --- /dev/null +++ b/advisories/_posts/2012-02-01-CVE-2012-6135.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2012-6135 (passenger): Phusion Passenger Gem for Ruby Arbitrary File Deletion' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2012-6135 + osvdb: 90738 + ghsa: 8mw8-j583-vqfg + url: http://old.blog.phusion.nl/2013/03/05/phusion-passenger-4-0-beta-1-and-2-arbitrary-file-deletion-vulnerability/ + title: Phusion Passenger Gem for Ruby Arbitrary File Deletion + date: 2012-02-01 + description: | + Phusion Passenger Gem for Ruby contains a flaw that is triggered during + application startup. This issue may allow a local attacker to delete arbitrary files + via an application process. If the program has completed the start up process this + vulnerability is no longer exploitable. + cvss_v2: 2.1 + cvss_v3: 7.5 + unaffected_versions: + - "< 4.0.0.beta" + patched_versions: + - ">= 4.0.0" +--- diff --git a/advisories/_posts/2012-02-29-CVE-2012-6684.md b/advisories/_posts/2012-02-29-CVE-2012-6684.md new file mode 100644 index 00000000..ac979ed0 --- /dev/null +++ b/advisories/_posts/2012-02-29-CVE-2012-6684.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2012-6684 (RedCloth): CVE-2012-6684 rubygem-RedCloth: XSS vulnerability' +comments: false +categories: +- RedCloth +advisory: + gem: RedCloth + cve: 2012-6684 + ghsa: r23g-3qw4-gfh2 + osvdb: 115941 + url: https://co3k.org/blog/redcloth-unfixed-xss-en + title: 'CVE-2012-6684 rubygem-RedCloth: XSS vulnerability' + date: 2012-02-29 + description: | + Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 + for Ruby and earlier allows remote attackers to inject arbitrary + web script or HTML via a javascript: URI. + cvss_v2: 4.3 + patched_versions: + - ">= 4.3.0" + related: + url: + - http://co3k.org/blog/redcloth-unfixed-xss-en + - https://gist.github.com/co3k/75b3cb416c342aa1414c + - https://github.com/jgarber/redcloth/commit/2f6dab4d6aea5cee778d2f37a135637fe3f1573c + - https://github.com/jgarber/redcloth/commit/b24f03db023d1653d60dd33b28e09317cd77c6a0 + - https://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss + - https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss + - https://nvd.nist.gov/vuln/detail/CVE-2012-6684 + - https://github.com/advisories/GHSA-r23g-3qw4-gfh2 + - http://seclists.org/fulldisclosure/2014/Dec/50 + - http://www.debian.org/security/2015/dsa-3168 +--- diff --git a/advisories/_posts/2012-03-01-CVE-2012-1098.md b/advisories/_posts/2012-03-01-CVE-2012-1098.md new file mode 100644 index 00000000..951ae787 --- /dev/null +++ b/advisories/_posts/2012-03-01-CVE-2012-1098.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2012-1098 (activesupport): CVE-2012-1098 rubygem-activesupport: XSS in + SafeBuffer#[] (unescaped safe buffers can be marked as safe)' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2012-1098 + osvdb: 79726 + ghsa: qv8p-v9qw-wc7g + url: https://nvd.nist.gov/vuln/detail/CVE-2012-1098 + title: 'CVE-2012-1098 rubygem-activesupport: XSS in SafeBuffer#[] (unescaped safe + buffers can be marked as safe)' + date: 2012-03-01 + description: | + Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before + 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject + arbitrary web script or HTML via vectors involving a SafeBuffer object that is manipulated + through certain methods. + cvss_v2: 4.3 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 3.0.12" + - "~> 3.1.4" + - ">= 3.2.2" +--- diff --git a/advisories/_posts/2012-03-01-CVE-2012-1099.md b/advisories/_posts/2012-03-01-CVE-2012-1099.md new file mode 100644 index 00000000..4ff121c1 --- /dev/null +++ b/advisories/_posts/2012-03-01-CVE-2012-1099.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2012-1099 (actionpack): CVE-2012-1099 rubygem-actionpack: XSS in the "select" + helper' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-1099 + osvdb: 79727 + ghsa: 2xjj-5x6h-8vmf + url: https://nvd.nist.gov/vuln/detail/CVE-2012-1099 + title: 'CVE-2012-1099 rubygem-actionpack: XSS in the "select" helper' + date: 2012-03-01 + description: | + Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb + in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and + 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML + via vectors involving certain generation of OPTION elements within SELECT elements. + cvss_v2: 4.3 + patched_versions: + - "~> 3.0.12" + - "~> 3.1.4" + - ">= 3.2.2" +--- diff --git a/advisories/_posts/2012-03-14-CVE-2012-2139.md b/advisories/_posts/2012-03-14-CVE-2012-2139.md new file mode 100644 index 00000000..07f90098 --- /dev/null +++ b/advisories/_posts/2012-03-14-CVE-2012-2139.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2012-2139 (mail): CVE-2012-2139 rubygem-mail: directory traversal' +comments: false +categories: +- mail +advisory: + gem: mail + cve: 2012-2139 + osvdb: 81631 + ghsa: cj92-c4fj-w9c5 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2139 + title: 'CVE-2012-2139 rubygem-mail: directory traversal' + date: 2012-03-14 + description: | + Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb + in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary + files via a .. (dot dot) in the to parameter. + cvss_v2: 5.0 + patched_versions: + - ">= 2.4.4" +--- diff --git a/advisories/_posts/2012-03-14-CVE-2012-2140.md b/advisories/_posts/2012-03-14-CVE-2012-2140.md new file mode 100644 index 00000000..46c71191 --- /dev/null +++ b/advisories/_posts/2012-03-14-CVE-2012-2140.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2012-2140 (mail): CVE-2012-2140 rubygem-mail: arbitrary command execution + when using exim or sendmail from commandline' +comments: false +categories: +- mail +advisory: + gem: mail + cve: 2012-2140 + osvdb: 81632 + ghsa: rp63-jfmw-532w + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2140 + title: 'CVE-2012-2140 rubygem-mail: arbitrary command execution when using exim + or sendmail from commandline' + date: 2012-03-14 + description: | + The Mail gem before 2.4.3 for Ruby allows remote attackers to execute + arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. + cvss_v2: 7.5 + patched_versions: + - ">= 2.4.4" +--- diff --git a/advisories/_posts/2012-04-20-CVE-2012-2126.md b/advisories/_posts/2012-04-20-CVE-2012-2126.md new file mode 100644 index 00000000..e49b030a --- /dev/null +++ b/advisories/_posts/2012-04-20-CVE-2012-2126.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2012-2126 (rubygems-update): CVE-2012-2125 CVE-2012-2126 rubygems: Two + security fixes in v1.8.23' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2012-2126 + osvdb: 81444 + ghsa: 5mgj-mvv8-46mw + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2126 + title: 'CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23' + date: 2012-04-20 + description: | + RubyGems before 1.8.23 does not verify an SSL certificate, which allows + remote attackers to modify a gem during installation via a man-in-the-middle attack. + cvss_v2: 4.3 + patched_versions: + - ">= 1.8.23" +--- diff --git a/advisories/_posts/2012-05-04-CVE-2012-6109.md b/advisories/_posts/2012-05-04-CVE-2012-6109.md new file mode 100644 index 00000000..6909fa66 --- /dev/null +++ b/advisories/_posts/2012-05-04-CVE-2012-6109.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2012-6109 (rack): CVE-2012-6109 rubygem-rack: parsing Content-Disposition + header DoS' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2012-6109 + osvdb: 89317 + ghsa: h77x-m5q8-c29h + url: https://nvd.nist.gov/vuln/detail/CVE-2012-6109 + title: 'CVE-2012-6109 rubygem-rack: parsing Content-Disposition header DoS' + date: 2012-05-04 + description: | + lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x + before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which + allows remote attackers to cause a denial of service (infinite loop) via a crafted + Content-Disposion header. + cvss_v2: 4.3 + patched_versions: + - "~> 1.1.4" + - "~> 1.2.6" + - "~> 1.3.7" + - ">= 1.4.2" +--- diff --git a/advisories/_posts/2012-05-11-OSVDB-96396.md b/advisories/_posts/2012-05-11-OSVDB-96396.md new file mode 100644 index 00000000..bcfbf51d --- /dev/null +++ b/advisories/_posts/2012-05-11-OSVDB-96396.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-96396 (activemodel): Don''t allow confirmation to pass if confirmation + value is nil and doesn''t match value.' +comments: false +categories: +- activemodel +- rails +advisory: + gem: activemodel + framework: rails + osvdb: 96396 + url: https://github.com/rails/rails/pull/8122 + title: Don't allow confirmation to pass if confirmation value is nil and doesn't + match value. + date: 2012-05-11 + description: | + Don't allow confirmation to pass if confirmation value is + nil and doesn't match value. + notes: Never patched; PR#8122 is closed but not merged + related: + url: + - https://github.com/rails/rails/pull/8122 + - https://github.com/rails/rails/pull/8122/commits/e8a50aa1c1f9d04c21b54e983f9a090d4b42c8eb + - https://github.com/rails/rails/commit/e8a50aa1c1f9d04c21b54e983f9a090d4b42c8eb + - https://github.com/rubysec/ruby-advisory-db/issues/178 +--- diff --git a/advisories/_posts/2012-05-29-CVE-2012-1053.md b/advisories/_posts/2012-05-29-CVE-2012-1053.md new file mode 100644 index 00000000..c825aeae --- /dev/null +++ b/advisories/_posts/2012-05-29-CVE-2012-1053.md @@ -0,0 +1,44 @@ +--- +layout: advisory +title: 'CVE-2012-1053 (puppet): Puppet Privilege Escallation' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-1053 + ghsa: 77hg-g8cc-5r37 + url: https://web.archive.org/web/20120504011717/http://puppetlabs.com/security/cve/cve-2012-1053 + title: Puppet Privilege Escallation + date: 2012-05-29 + description: | + The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) + in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) + Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, + which allows local users to gain privileges via vectors related to (1) the change_user + not dropping supplementary groups in certain conditions, (2) changes to the eguid + without associated changes to the egid, or (3) the addition of the real gid to supplementary + groups. + cvss_v2: 6.5 + unaffected_versions: + - "< 2.6" + patched_versions: + - "~> 2.6.14" + - ">= 2.7.11" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-1053 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/73445 + - https://hermes.opensuse.org/messages/15087408 + - https://github.com/puppetlabs/puppet/commit/76d0749f0a9a496b70e7dc7e6d6d6ff692224e36 + - https://lists.opensuse.org/opensuse-security-announce/2012-03/msg00003.html + - https://ubuntu.com/usn/usn-1372-1 + - https://web.archive.org/web/20120504011717/http://puppetlabs.com/security/cve/cve-2012-1053 + - https://web.archive.org/web/20120513215447/http://projects.puppetlabs.com/issues/12458 + - https://web.archive.org/web/20120513215653/http://projects.puppetlabs.com/issues/12457 + - https://web.archive.org/web/20120513223437/http://projects.puppetlabs.com/issues/12459 + - https://web.archive.org/web/20120527071855/http://www.securityfocus.com/bid/52158 + - https://web.archive.org/web/20120816020421/http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.6.14 + - https://www.debian.org/security/2012/dsa-2419 + - https://github.com/advisories/GHSA-77hg-g8cc-5r37 +--- diff --git a/advisories/_posts/2012-05-29-CVE-2012-1906.md b/advisories/_posts/2012-05-29-CVE-2012-1906.md new file mode 100644 index 00000000..bb2c4b79 --- /dev/null +++ b/advisories/_posts/2012-05-29-CVE-2012-1906.md @@ -0,0 +1,36 @@ +--- +layout: advisory +title: 'CVE-2012-1906 (puppet): Puppet uses predictable filenames, allowing arbitrary + file overwrite' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-1906 + ghsa: c4mc-49hq-q275 + url: https://exchange.xforce.ibmcloud.com/vulnerabilities/74793 + title: Puppet uses predictable filenames, allowing arbitrary file overwrite + date: 2012-05-29 + description: | + Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise + (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 uses predictable file + names when installing Mac OS X packages from a remote source, which allows local + users to overwrite arbitrary files or install arbitrary packages via a symlink attack + on a temporary file in /tmp. + cvss_v2: 3.3 + unaffected_versions: + - "< 2.6" + patched_versions: + - "~> 2.6.15" + - ">= 2.7.13" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-1906 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/74793 + - https://github.com/puppetlabs/puppet/commit/f7829ec1f1b2c3def8e0eda09c22c3c1fed3a27f + - https://ubuntu.com/usn/usn-1419-1 + - https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975 + - https://www.debian.org/security/2012/dsa-2451 + - https://github.com/advisories/GHSA-c4mc-49hq-q275 +--- diff --git a/advisories/_posts/2012-05-31-CVE-2012-2660.md b/advisories/_posts/2012-05-31-CVE-2012-2660.md new file mode 100644 index 00000000..fbba268e --- /dev/null +++ b/advisories/_posts/2012-05-31-CVE-2012-2660.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2012-2660 (activerecord): CVE-2012-2660 rubygem-actionpack: Unsafe query + generation' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2012-2660 + osvdb: 82610 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2660 + title: 'CVE-2012-2660 rubygem-actionpack: Unsafe query generation' + date: 2012-05-31 + description: | + actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before + 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider differences + in parameter handling between the Active Record component and the Rack interface, + which allows remote attackers to bypass intended database-query restrictions and + perform NULL checks via a crafted request, as demonstrated by certain "[nil]" values, + a related issue to CVE-2012-2694. + cvss_v2: 7.5 + patched_versions: + - "~> 3.0.13" + - "~> 3.1.5" + - ">= 3.2.4" +--- diff --git a/advisories/_posts/2012-05-31-CVE-2012-2661.md b/advisories/_posts/2012-05-31-CVE-2012-2661.md new file mode 100644 index 00000000..73cf139b --- /dev/null +++ b/advisories/_posts/2012-05-31-CVE-2012-2661.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2012-2661 (activerecord): CVE-2012-2661 rubygem-activerecord: SQL injection + when processing nested query paramaters' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2012-2661 + osvdb: 82403 + ghsa: fh39-v733-mxfr + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661 + title: 'CVE-2012-2661 rubygem-activerecord: SQL injection when processing nested + query paramaters' + date: 2012-05-31 + description: | + The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x + before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of + request data to a where method in an ActiveRecord class, which allows remote attackers + to conduct certain SQL injection attacks via nested query parameters that leverage + unintended recursion, a related issue to CVE-2012-2695. + cvss_v2: 5.0 + unaffected_versions: + - "~> 2.3.14" + patched_versions: + - "~> 3.0.13" + - "~> 3.1.5" + - ">= 3.2.4" +--- diff --git a/advisories/_posts/2012-06-06-CVE-2012-2671.md b/advisories/_posts/2012-06-06-CVE-2012-2671.md new file mode 100644 index 00000000..90421f01 --- /dev/null +++ b/advisories/_posts/2012-06-06-CVE-2012-2671.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2012-2671 (rack-cache): rack-cache Rubygem Sensitive HTTP Header Caching + Weakness' +comments: false +categories: +- rack-cache +advisory: + gem: rack-cache + cve: 2012-2671 + osvdb: 83077 + ghsa: hrp6-w4v2-8737 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2671 + title: rack-cache Rubygem Sensitive HTTP Header Caching Weakness + date: 2012-06-06 + description: | + Rack::Cache (rack-cache) contains a flaw related to the rubygem caching + sensitive HTTP headers. This will result in a weakness that may make it + easier for an attacker to gain access to a user's session via a specially + crafted header. + cvss_v2: 7.5 + patched_versions: + - ">= 1.2" +--- diff --git a/advisories/_posts/2012-06-08-CVE-2012-6685.md b/advisories/_posts/2012-06-08-CVE-2012-6685.md new file mode 100644 index 00000000..743058e2 --- /dev/null +++ b/advisories/_posts/2012-06-08-CVE-2012-6685.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2012-6685 (nokogiri): CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity + (XXE) flaw' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2012-6685 + osvdb: 90946 + ghsa: 6wj9-77wq-jq7p + url: https://nvd.nist.gov/vuln/detail/CVE-2012-6685 + title: 'CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity (XXE) flaw' + date: 2012-06-08 + description: 'Nokogiri before 1.5.4 is vulnerable to XXE attacks + + ' + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 1.5.4" +--- diff --git a/advisories/_posts/2012-07-02-OSVDB-125712.md b/advisories/_posts/2012-07-02-OSVDB-125712.md new file mode 100644 index 00000000..eb59c787 --- /dev/null +++ b/advisories/_posts/2012-07-02-OSVDB-125712.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-125712 (spree): Product Scopes could allow for unauthenticated remote + command execution' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 125712 + url: https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions + title: Product Scopes could allow for unauthenticated remote command execution + date: 2012-07-02 + description: | + Product Scopes could allow for unauthenticated remote command execution. + This was corrected by removing conditions_any scope and use ARel query + building instead. + patched_versions: + - "~> 0.11.4" + - "~> 0.70.6" + - "~> 1.0.5" + - ">= 1.1.2" + related: + url: + - https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions + - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20034 +--- diff --git a/advisories/_posts/2012-07-02-OSVDB-125713.md b/advisories/_posts/2012-07-02-OSVDB-125713.md new file mode 100644 index 00000000..602ef0d4 --- /dev/null +++ b/advisories/_posts/2012-07-02-OSVDB-125713.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-125713 (spree): Potential XSS vulnerability related to the analytics + dashboard' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 125713 + url: https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions + title: Potential XSS vulnerability related to the analytics dashboard + date: 2012-07-02 + description: | + Spree has a flaw in its analytics dashboard where + keywords are not escaped, leading to potential XSS. + patched_versions: + - "~> 0.11.4" + - "~> 0.70.6" + - "~> 1.0.5" + - ">= 1.1.2" + related: + url: + - https://web.archive.org/web/20121126005814/https://spreecommerce.com/blog/security-issue-all-versions +--- diff --git a/advisories/_posts/2012-07-26-CVE-2012-3424.md b/advisories/_posts/2012-07-26-CVE-2012-3424.md new file mode 100644 index 00000000..2de76573 --- /dev/null +++ b/advisories/_posts/2012-07-26-CVE-2012-3424.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2012-3424 (actionpack): CVE-2012-3424 rubygem-actionpack: DoS vulnerability + in authenticate_or_request_with_http_digest' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-3424 + osvdb: 84243 + ghsa: 92w9-2pqw-rhjj + url: https://nvd.nist.gov/vuln/detail/CVE-2012-3424 + title: 'CVE-2012-3424 rubygem-actionpack: DoS vulnerability in authenticate_or_request_with_http_digest' + date: 2012-07-26 + description: | + The decode_credentials method in actionpack/lib/action_controller/metal/http_authentication.rb + in Ruby on Rails 3.x before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts + Digest Authentication strings to symbols, which allows remote attackers to cause + a denial of service by leveraging access to an application that uses a with_http_digest + helper method, as demonstrated by the authenticate_or_request_with_http_digest method. + cvss_v2: 5.0 + unaffected_versions: + - ">= 2.3.5, <= 2.3.14" + patched_versions: + - "~> 3.0.16" + - "~> 3.1.7" + - ">= 3.2.7" +--- diff --git a/advisories/_posts/2012-08-08-CVE-2010-5142.md b/advisories/_posts/2012-08-08-CVE-2010-5142.md new file mode 100644 index 00000000..ab123a42 --- /dev/null +++ b/advisories/_posts/2012-08-08-CVE-2010-5142.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2010-5142 (chef): Chef Improper Access Control Vulnerability' +comments: false +categories: +- chef +advisory: + gem: chef + cve: 2010-5142 + ghsa: f68m-q26r-64f6 + url: https://github.com/advisories/GHSA-f68m-q26r-64f6 + title: Chef Improper Access Control Vulnerability + date: 2012-08-08 + description: | + `chef-server-api/app/controllers/users.rb` in the API in Chef before + 0.9.0 does not require administrative privileges for the create, + destroy, and update methods, which allows remote authenticated + users to manage user accounts via requests to the /users URI. + cvss_v2: 6.5 + patched_versions: + - ">= 0.9.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2010-5142 + - https://vuldb.com/?id.61514 + - http://tickets.opscode.com/browse/CHEF-1289 + - https://github.com/opscode/chef/commit/c3bb41f727fbe00e5de719d687757b24c8dcdfc8 + - https://github.com/advisories/GHSA-f68m-q26r-64f6 +--- diff --git a/advisories/_posts/2012-08-09-CVE-2012-3463.md b/advisories/_posts/2012-08-09-CVE-2012-3463.md new file mode 100644 index 00000000..2fcaa7a5 --- /dev/null +++ b/advisories/_posts/2012-08-09-CVE-2012-3463.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2012-3463 (actionpack): CVE-2012-3463 rubygem-actionpack: potential XSS + vulnerability in select_tag prompt' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-3463 + osvdb: 84515 + ghsa: 98mf-8f57-64qf + url: https://nvd.nist.gov/vuln/detail/CVE-2012-3463 + title: 'CVE-2012-3463 rubygem-actionpack: potential XSS vulnerability in select_tag + prompt' + date: 2012-08-09 + description: | + Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb + in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows + remote attackers to inject arbitrary web script or HTML via the prompt field to + the select_tag helper. + cvss_v2: 4.3 + unaffected_versions: + - "~> 2.3.0" + patched_versions: + - "~> 3.0.17" + - "~> 3.1.8" + - ">= 3.2.8" +--- diff --git a/advisories/_posts/2012-08-09-CVE-2012-3464.md b/advisories/_posts/2012-08-09-CVE-2012-3464.md new file mode 100644 index 00000000..846d1fd4 --- /dev/null +++ b/advisories/_posts/2012-08-09-CVE-2012-3464.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2012-3464 (activesupport): CVE-2012-3464 rubygem-actionpack: potential + XSS vulnerability' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2012-3464 + osvdb: 84516 + ghsa: h835-75hw-pj89 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-3464 + title: 'CVE-2012-3464 rubygem-actionpack: potential XSS vulnerability' + date: 2012-08-09 + description: | + Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb + in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might + allow remote attackers to inject arbitrary web script or HTML via vectors involving + a ' (quote) character. + cvss_v2: 4.3 + patched_versions: + - "~> 3.0.17" + - "~> 3.1.8" + - ">= 3.2.8" +--- diff --git a/advisories/_posts/2012-08-09-CVE-2012-3465.md b/advisories/_posts/2012-08-09-CVE-2012-3465.md new file mode 100644 index 00000000..804174e8 --- /dev/null +++ b/advisories/_posts/2012-08-09-CVE-2012-3465.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2012-3465 (actionpack): CVE-2012-3465 rubygem-actionpack: XSS Vulnerability + in strip_tags' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-3465 + osvdb: 84513 + ghsa: 7g65-ghrg-hpf5 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-3465 + title: 'CVE-2012-3465 rubygem-actionpack: XSS Vulnerability in strip_tags' + date: 2012-08-09 + description: | + Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_helper.rb + in the strip_tags helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and + 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML + via malformed HTML markup. + cvss_v2: 4.3 + patched_versions: + - "~> 3.0.17" + - "~> 3.1.8" + - ">= 3.2.8" +--- diff --git a/advisories/_posts/2012-09-08-CVE-2012-6134.md b/advisories/_posts/2012-09-08-CVE-2012-6134.md new file mode 100644 index 00000000..6f7eba59 --- /dev/null +++ b/advisories/_posts/2012-09-08-CVE-2012-6134.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2012-6134 (omniauth-oauth2): Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability' +comments: false +categories: +- omniauth-oauth2 +advisory: + gem: omniauth-oauth2 + cve: 2012-6134 + osvdb: 90264 + ghsa: fgmx-8h93-26fh + url: https://nvd.nist.gov/vuln/detail/CVE-2012-6134 + title: Ruby on Rails omniauth-oauth2 Gem CSRF vulnerability + date: 2012-09-08 + description: | + The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to + inject values into a user's session through a CSRF attack. + cvss_v2: 6.8 + patched_versions: + - ">= 1.1.1" +--- diff --git a/advisories/_posts/2012-09-08-OSVDB-90945.md b/advisories/_posts/2012-09-08-OSVDB-90945.md new file mode 100644 index 00000000..cd7f6427 --- /dev/null +++ b/advisories/_posts/2012-09-08-OSVDB-90945.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'OSVDB-90945 (loofah): Loofah HTML and XSS injection vulnerability' +comments: false +categories: +- loofah +advisory: + gem: loofah + osvdb: 90945 + url: https://security.snyk.io/vuln/SNYK-RUBY-LOOFAH-20039 + title: Loofah HTML and XSS injection vulnerability + date: 2012-09-08 + description: | + Loofah Gem for Ruby contains a flaw that allows a remote cross-site + scripting (XSS) attack. This flaw exists because the + Loofah::HTML::Document\#text function passes properly sanitized + user-supplied input to the Loofah::XssFoliate and + Loofah::Helpers\#strip_tags functions which convert input back to + text. This may allow an attacker to create a specially crafted + request that would execute arbitrary script code in a user's browser + within the trust relationship between their browser and the server. + cvss_v2: 5.0 + patched_versions: + - ">= 0.4.6" + related: + url: + - https://github.com/flavorjones/loofah/compare/v0.4.5...v0.4.6 + - https://security.snyk.io/vuln/SNYK-RUBY-LOOFAH-20039 + - https://www.versioneye.com/Ruby/loofah/0.4.2 + - https://www.mend.io/vulnerability-database/WS-2012-0023 + - http://www.osvdb.org/show/osvdb/90945 +--- diff --git a/advisories/_posts/2012-09-25-CVE-2012-2125.md b/advisories/_posts/2012-09-25-CVE-2012-2125.md new file mode 100644 index 00000000..733853ef --- /dev/null +++ b/advisories/_posts/2012-09-25-CVE-2012-2125.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2012-2125 (rubygems-update): CVE-2012-2125 CVE-2012-2126 rubygems: Two + security fixes in v1.8.23' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2012-2125 + osvdb: 85809 + ghsa: 228f-g3h7-3fj3 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-2125 + title: 'CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23' + date: 2012-09-25 + description: | + RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which + makes it easier for remote attackers to observe or modify a gem during + installation via a man-in-the-middle attack. + cvss_v2: 5.8 + patched_versions: + - ">= 1.8.23" +--- diff --git a/advisories/_posts/2012-12-04-CVE-2012-5604.md b/advisories/_posts/2012-12-04-CVE-2012-5604.md new file mode 100644 index 00000000..7ebdfeac --- /dev/null +++ b/advisories/_posts/2012-12-04-CVE-2012-5604.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2012-5604 (ldap_fluff): CVE-2012-5604 rubygem-ldap_fluff: CloudForms authentication + bypass when handling anonymous LDAP bind' +comments: false +categories: +- ldap_fluff +advisory: + gem: ldap_fluff + cve: 2012-5604 + osvdb: 90579 + ghsa: 9whh-582r-589h + url: https://nvd.nist.gov/vuln/detail/CVE-2012-5604 + title: 'CVE-2012-5604 rubygem-ldap_fluff: CloudForms authentication bypass when + handling anonymous LDAP bind' + date: 2012-12-04 + description: | + The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when + using Active Directory for authentication, allows remote attackers to bypass authentication + via unspecified vectors. + cvss_v2: 5.0 + patched_versions: + - ">= 0.1.3" +--- diff --git a/advisories/_posts/2012-12-06-CVE-2013-0284.md b/advisories/_posts/2012-12-06-CVE-2013-0284.md new file mode 100644 index 00000000..68538139 --- /dev/null +++ b/advisories/_posts/2012-12-06-CVE-2013-0284.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-0284 (newrelic_rpm): Ruby on Rails newrelic_rpm Gem Discloses Sensitive + Information' +comments: false +categories: +- newrelic_rpm +advisory: + gem: newrelic_rpm + cve: 2013-0284 + osvdb: 90189 + ghsa: q6cw-2553-7837 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0284 + title: Ruby on Rails newrelic_rpm Gem Discloses Sensitive Information + date: 2012-12-06 + description: | + A bug in the Ruby agent causes database connection information and raw SQL + statements to be transmitted to New Relic servers. The database connection + information includes the database IP address, username, and password + cvss_v2: 5.0 + patched_versions: + - ">= 3.5.3.25" +--- diff --git a/advisories/_posts/2012-12-21-CVE-2012-6497.md b/advisories/_posts/2012-12-21-CVE-2012-6497.md new file mode 100644 index 00000000..ef018048 --- /dev/null +++ b/advisories/_posts/2012-12-21-CVE-2012-6497.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2012-6497 (authlogic): Ruby on Rails Authlogic Gem secret_token.rb Known + secret_token Value Weakness' +comments: false +categories: +- authlogic +advisory: + gem: authlogic + cve: 2012-6497 + osvdb: 89064 + ghsa: rx7j-mw4c-76g9 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-6497 + title: Ruby on Rails Authlogic Gem secret_token.rb Known secret_token Value Weakness + date: 2012-12-21 + description: | + Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered + when the program makes an unsafe method call for find_by_id. With a specially + crafted parameter in an environment that knows the secret_token value in + secret_token.rb, a remote attacker to more easily conduct SQL injection + attacks. + patched_versions: + - ">= 3.3.0" +--- diff --git a/advisories/_posts/2012-12-22-CVE-2012-6496.md b/advisories/_posts/2012-12-22-CVE-2012-6496.md new file mode 100644 index 00000000..c4ab0d55 --- /dev/null +++ b/advisories/_posts/2012-12-22-CVE-2012-6496.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2012-6496 (activerecord): Ruby on Rails find_by_* Methods Authlogic SQL + Injection Bypass' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2012-6496 + osvdb: 88661 + ghsa: gh2w-j7cx-2664 + url: https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/DCNTNp_qjFM + title: Ruby on Rails find_by_* Methods Authlogic SQL Injection Bypass + date: 2012-12-22 + description: | + Due to the way dynamic finders in Active Record extract options from method + parameters, a method parameter can mistakenly be used as a scope. Carefully + crafted requests can use the scope to inject arbitrary SQL. + cvss_v2: 6.4 + patched_versions: + - "~> 3.0.18" + - "~> 3.1.9" + - ">= 3.2.10" +--- diff --git a/advisories/_posts/2013-01-07-CVE-2013-0183.md b/advisories/_posts/2013-01-07-CVE-2013-0183.md new file mode 100644 index 00000000..580d306b --- /dev/null +++ b/advisories/_posts/2013-01-07-CVE-2013-0183.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-0183 (rack): CVE-2013-0183 rubygem-rack: receiving excessively long + lines triggers out-of-memory error' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2013-0183 + osvdb: 89320 + ghsa: 3pxh-h8hw-mj8w + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0183 + title: 'CVE-2013-0183 rubygem-rack: receiving excessively long lines triggers out-of-memory + error' + date: 2013-01-07 + description: | + multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 + allows remote attackers to cause a denial of service (memory consumption and out-of-memory + error) via a long string in a Multipart HTTP packet. + cvss_v2: 5.0 + patched_versions: + - "~> 1.3.8" + - ">= 1.4.3" +--- diff --git a/advisories/_posts/2013-01-08-CVE-2013-0155.md b/advisories/_posts/2013-01-08-CVE-2013-0155.md new file mode 100644 index 00000000..6bb5c252 --- /dev/null +++ b/advisories/_posts/2013-01-08-CVE-2013-0155.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-0155 (activerecord): CVE-2013-0155 rubygem-actionpack, rubygem-activerecord: + Unsafe Query Generation Risk in Ruby on Rails' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2013-0155 + osvdb: 89025 + ghsa: gppp-5xc5-wfpx + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0155 + title: 'CVE-2013-0155 rubygem-actionpack, rubygem-activerecord: Unsafe Query Generation + Risk in Ruby on Rails' + date: 2013-01-08 + description: | + Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before + 3.2.11 does not properly consider differences in parameter handling between the + Active Record component and the JSON implementation, which allows remote attackers + to bypass intended database-query restrictions and perform NULL checks or trigger + missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" + values, a related issue to CVE-2012-2660 and CVE-2012-2694. + cvss_v2: 10.0 + patched_versions: + - "~> 2.3.16" + - "~> 3.0.19" + - "~> 3.1.10" + - ">= 3.2.11" +--- diff --git a/advisories/_posts/2013-01-08-CVE-2013-0156.md b/advisories/_posts/2013-01-08-CVE-2013-0156.md new file mode 100644 index 00000000..44b9c004 --- /dev/null +++ b/advisories/_posts/2013-01-08-CVE-2013-0156.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-0156 (actionpack): CVE-2013-0156 rubygem-activesupport: Multiple + vulnerabilities in parameter parsing in ActionPack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-0156 + osvdb: 89026 + ghsa: jmgw-6vjg-jjwg + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0156 + title: 'CVE-2013-0156 rubygem-activesupport: Multiple vulnerabilities in parameter + parsing in ActionPack' + date: 2013-01-08 + description: | + active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, + 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly + restrict casts of string values, which allows remote attackers to conduct object-injection + attacks and execute arbitrary code, or cause a denial of service (memory and CPU + consumption) involving nested XML entity references, by leveraging Action Pack support + for (1) YAML type conversion or (2) Symbol type conversion. + cvss_v2: 10.0 + patched_versions: + - "~> 2.3.15" + - "~> 3.0.19" + - "~> 3.1.10" + - ">= 3.2.11" +--- diff --git a/advisories/_posts/2013-01-08-CVE-2013-1802.md b/advisories/_posts/2013-01-08-CVE-2013-1802.md new file mode 100644 index 00000000..f5166b32 --- /dev/null +++ b/advisories/_posts/2013-01-08-CVE-2013-1802.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1802 (extlib): extlib Gem for Ruby Type Casting Parameter Parsing + Remote Code Execution' +comments: false +categories: +- extlib +advisory: + gem: extlib + cve: 2013-1802 + osvdb: 90740 + ghsa: 9h36-4jf2-hx53 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1802 + title: extlib Gem for Ruby Type Casting Parameter Parsing Remote Code Execution + date: 2013-01-08 + description: | + extlib Gem for Ruby contains a flaw that is triggered when a type casting + error occurs during the parsing of parameters. This may allow a + context-dependent attacker to potentially execute arbitrary code. + cvss_v2: 9.3 + patched_versions: + - ">= 0.9.16" +--- diff --git a/advisories/_posts/2013-01-09-CVE-2013-1800.md b/advisories/_posts/2013-01-09-CVE-2013-1800.md new file mode 100644 index 00000000..01fc749c --- /dev/null +++ b/advisories/_posts/2013-01-09-CVE-2013-1800.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-1800 (crack): CVE-2013-1800 rubygem-crack: YAML parameter parsing + vulnerability' +comments: false +categories: +- crack +advisory: + gem: crack + cve: 2013-1800 + osvdb: 90742 + ghsa: m7fq-cf8q-35q7 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1800 + title: 'CVE-2013-1800 rubygem-crack: YAML parameter parsing vulnerability' + date: 2013-01-09 + description: | + The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts + of string values, which might allow remote attackers to conduct object-injection + attacks and execute arbitrary code, or cause a denial of service (memory and CPU + consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) + Symbol type conversion, a similar vulnerability to CVE-2013-0156. + cvss_v2: 7.5 + patched_versions: + - ">= 0.3.2" +--- diff --git a/advisories/_posts/2013-01-10-CVE-2013-0285.md b/advisories/_posts/2013-01-10-CVE-2013-0285.md new file mode 100644 index 00000000..dc72a6ab --- /dev/null +++ b/advisories/_posts/2013-01-10-CVE-2013-0285.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-0285 (nori): Ruby Gem nori Parameter Parsing Remote Code Execution' +comments: false +categories: +- nori +advisory: + gem: nori + cve: 2013-0285 + osvdb: 90196 + ghsa: 4936-rj25-6wm6 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0285 + title: Ruby Gem nori Parameter Parsing Remote Code Execution + date: 2013-01-10 + description: | + The Ruby Gem nori has a parameter parsing error that may allow an attacker + to execute arbitrary code. This vulnerability has to do with type casting + during parsing, and is related to CVE-2013-0156. + cvss_v2: 7.5 + patched_versions: + - "~> 1.0.3" + - "~> 1.1.4" + - ">= 2.0.2" +--- diff --git a/advisories/_posts/2013-01-11-CVE-2013-0175.md b/advisories/_posts/2013-01-11-CVE-2013-0175.md new file mode 100644 index 00000000..1c81a2c1 --- /dev/null +++ b/advisories/_posts/2013-01-11-CVE-2013-0175.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-0175 (multi_xml): multi_xml Gem for Ruby XML Parameter Parsing Remote + Command Execution' +comments: false +categories: +- multi_xml +advisory: + gem: multi_xml + cve: 2013-0175 + osvdb: 89148 + ghsa: pchc-949f-53m5 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0175 + title: multi_xml Gem for Ruby XML Parameter Parsing Remote Command Execution + date: 2013-01-11 + description: | + The multi_xml Gem for Ruby contains a flaw that is triggered when an error + occurs during the parsing of the 'XML' parameter. With a crafted request + containing arbitrary symbol and yaml types, a remote attacker can execute + arbitrary commands. + patched_versions: + - ">= 0.5.2" +--- diff --git a/advisories/_posts/2013-01-13-CVE-2013-0184.md b/advisories/_posts/2013-01-13-CVE-2013-0184.md new file mode 100644 index 00000000..1ca92db5 --- /dev/null +++ b/advisories/_posts/2013-01-13-CVE-2013-0184.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2013-0184 (rack): CVE-2013-0184 rubygem-rack: Rack::Auth::AbstractRequest + DoS' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2013-0184 + osvdb: 89327 + ghsa: v882-ccj6-jc48 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0184 + title: 'CVE-2013-0184 rubygem-rack: Rack::Auth::AbstractRequest DoS' + date: 2013-01-13 + description: | + Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x + before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows + remote attackers to cause a denial of service via unknown vectors related to "symbolized + arbitrary strings." + cvss_v2: 4.3 + patched_versions: + - "~> 1.1.5" + - "~> 1.2.7" + - "~> 1.3.9" + - ">= 1.4.4" +--- diff --git a/advisories/_posts/2013-01-14-CVE-2013-1801.md b/advisories/_posts/2013-01-14-CVE-2013-1801.md new file mode 100644 index 00000000..75803529 --- /dev/null +++ b/advisories/_posts/2013-01-14-CVE-2013-1801.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1801 (httparty): httparty Gem for Ruby Type Casting Parameter Parsing + Remote Code Execution' +comments: false +categories: +- httparty +advisory: + gem: httparty + cve: 2013-1801 + osvdb: 90741 + ghsa: mgx3-27hr-mfgp + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1801 + title: httparty Gem for Ruby Type Casting Parameter Parsing Remote Code Execution + date: 2013-01-14 + description: | + httparty Gem for Ruby contains a flaw that is triggered when a type casting + error occurs during the parsing of parameters. This may allow a + context-dependent attacker to potentially execute arbitrary code. + cvss_v2: 7.5 + patched_versions: + - ">= 0.10.0" +--- diff --git a/advisories/_posts/2013-01-28-CVE-2013-0233.md b/advisories/_posts/2013-01-28-CVE-2013-0233.md new file mode 100644 index 00000000..ed16fd35 --- /dev/null +++ b/advisories/_posts/2013-01-28-CVE-2013-0233.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-0233 (devise): Devise Database Type Conversion Crafted Request Parsing + Security Bypass' +comments: false +categories: +- devise +advisory: + gem: devise + cve: 2013-0233 + osvdb: 89642 + ghsa: jxhw-mg8m-2pj8 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0233 + title: Devise Database Type Conversion Crafted Request Parsing Security Bypass + date: 2013-01-28 + description: | + Devise contains a flaw that is triggered during when a type conversion error + occurs during the parsing of a malformed request. With a specially crafted + request, a remote attacker can bypass security restrictions. + cvss_v2: 6.8 + patched_versions: + - "~> 1.5.4" + - "~> 2.0.5" + - "~> 2.1.3" + - ">= 2.2.3" +--- diff --git a/advisories/_posts/2013-01-28-CVE-2013-0333.md b/advisories/_posts/2013-01-28-CVE-2013-0333.md new file mode 100644 index 00000000..7f52edd3 --- /dev/null +++ b/advisories/_posts/2013-01-28-CVE-2013-0333.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0333 (activesupport): CVE-2013-0333 rubygem-activesupport: json to + yaml parsing' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2013-0333 + osvdb: 89594 + ghsa: xgr2-v94m-rc9g + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0333 + title: 'CVE-2013-0333 rubygem-activesupport: json to yaml parsing' + date: 2013-01-28 + description: | + lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before + 2.3.16 and 3.0.x before 3.0.20 does not properly convert JSON data to YAML data + for processing by a YAML parser, which allows remote attackers to execute arbitrary + code, conduct SQL injection attacks, or bypass authentication via crafted data that + triggers unsafe decoding, a different vulnerability than CVE-2013-0156. + cvss_v2: 9.3 + patched_versions: + - "~> 2.3.16" + - ">= 3.0.20" +--- diff --git a/advisories/_posts/2013-02-06-CVE-2013-0256.md b/advisories/_posts/2013-02-06-CVE-2013-0256.md new file mode 100644 index 00000000..fff930cb --- /dev/null +++ b/advisories/_posts/2013-02-06-CVE-2013-0256.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-0256 (rdoc): CVE-2013-0256 rubygem-rdoc: Cross-site scripting in + the documentation created by Darkfish Rdoc HTML generator / template' +comments: false +categories: +- rdoc +advisory: + gem: rdoc + cve: 2013-0256 + osvdb: 90004 + ghsa: v2r9-c84j-v7xm + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0256 + title: 'CVE-2013-0256 rubygem-rdoc: Cross-site scripting in the documentation created + by Darkfish Rdoc HTML generator / template' + date: 2013-02-06 + description: | + darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, + as used in Ruby, does not properly generate documents, which allows remote attackers + to conduct cross-site scripting (XSS) attacks via a crafted URL. + cvss_v2: 4.3 + patched_versions: + - "~> 3.9.5" + - "~> 3.12.1" + - ">= 4.0" +--- diff --git a/advisories/_posts/2013-02-07-CVE-2013-0262.md b/advisories/_posts/2013-02-07-CVE-2013-0262.md new file mode 100644 index 00000000..c778982d --- /dev/null +++ b/advisories/_posts/2013-02-07-CVE-2013-0262.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-0262 (rack): CVE-2013-0262 rubygem-rack: Path sanitization information + disclosure' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2013-0262 + osvdb: 89938 + ghsa: 85r7-w5mv-c849 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0262 + title: 'CVE-2013-0262 rubygem-rack: Path sanitization information disclosure' + date: 2013-02-07 + description: | + rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before + 1.4.5 allows attackers to access arbitrary files outside the intended root directory + via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability + that is remotely exploitable, aka "symlink path traversals." + cvss_v2: 4.3 + patched_versions: + - "~> 1.4.5" + - ">= 1.5.2" +--- diff --git a/advisories/_posts/2013-02-07-CVE-2013-0263.md b/advisories/_posts/2013-02-07-CVE-2013-0263.md new file mode 100644 index 00000000..fb4f1ab6 --- /dev/null +++ b/advisories/_posts/2013-02-07-CVE-2013-0263.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0263 (rack): CVE-2013-0263 rubygem-rack: Timing attack in cookie + sessions' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2013-0263 + osvdb: 89939 + ghsa: xc85-32mf-xpv8 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0263 + title: 'CVE-2013-0263 rubygem-rack: Timing attack in cookie sessions' + date: 2013-02-07 + description: | + Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, + 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers + to guess the session cookie, gain privileges, and execute arbitrary code via a timing + attack involving an HMAC comparison function that does not run in constant time. + cvss_v2: 5.1 + patched_versions: + - "~> 1.1.6" + - "~> 1.2.8" + - "~> 1.3.10" + - "~> 1.4.5" + - ">= 1.5.2" +--- diff --git a/advisories/_posts/2013-02-11-CVE-2013-0276.md b/advisories/_posts/2013-02-11-CVE-2013-0276.md new file mode 100644 index 00000000..f44a87bb --- /dev/null +++ b/advisories/_posts/2013-02-11-CVE-2013-0276.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0276 (activerecord): CVE-2013-0276 rubygem-activerecord/rubygem-activemodel: + circumvention of attr_protected' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2013-0276 + osvdb: 90072 + ghsa: gr44-7grc-37vq + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0276 + title: 'CVE-2013-0276 rubygem-activerecord/rubygem-activemodel: circumvention of + attr_protected' + date: 2013-02-11 + description: | + ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and + 3.2.x before 3.2.12 allows remote attackers to bypass the attr_protected protection + mechanism and modify protected model attributes via a crafted request. + cvss_v2: 5.0 + patched_versions: + - "~> 2.3.17" + - "~> 3.1.11" + - ">= 3.2.12" +--- diff --git a/advisories/_posts/2013-02-11-CVE-2013-0277.md b/advisories/_posts/2013-02-11-CVE-2013-0277.md new file mode 100644 index 00000000..6cf7d6a5 --- /dev/null +++ b/advisories/_posts/2013-02-11-CVE-2013-0277.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0277 (activerecord): CVE-2013-0277 rubygem-activerecord: Serialized + Attributes YAML Vulnerability with Rails 2.3 and 3.0' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2013-0277 + osvdb: 90073 + ghsa: fhj9-cjjh-27vm + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0277 + title: 'CVE-2013-0277 rubygem-activerecord: Serialized Attributes YAML Vulnerability + with Rails 2.3 and 3.0' + date: 2013-02-11 + description: | + ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows + remote attackers to cause a denial of service or execute arbitrary code via crafted + serialized attributes that cause the +serialize+ helper to deserialize arbitrary + YAML. + cvss_v2: 10.0 + patched_versions: + - "~> 2.3.17" + - ">= 3.1.0" +--- diff --git a/advisories/_posts/2013-02-12-CVE-2013-0269.md b/advisories/_posts/2013-02-12-CVE-2013-0269.md new file mode 100644 index 00000000..e5b172e9 --- /dev/null +++ b/advisories/_posts/2013-02-12-CVE-2013-0269.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0269 (json): CVE-2013-0269 rubygem-json: Denial of Service and SQL + Injection' +comments: false +categories: +- json +advisory: + gem: json + cve: 2013-0269 + osvdb: 101137 + ghsa: x457-cw4h-hq5f + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0269 + title: 'CVE-2013-0269 rubygem-json: Denial of Service and SQL Injection' + date: 2013-02-12 + description: | + The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 + for Ruby allows remote attackers to cause a denial of service (resource consumption) + or bypass the mass assignment protection mechanism via a crafted JSON document that + triggers the creation of arbitrary Ruby symbols or certain internal objects, as + demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe + Object Creation Vulnerability." + cvss_v2: 9.0 + patched_versions: + - "~> 1.5.5" + - "~> 1.6.8" + - ">= 1.7.7" +--- diff --git a/advisories/_posts/2013-02-12-OSVDB-115090.md b/advisories/_posts/2013-02-12-OSVDB-115090.md new file mode 100644 index 00000000..29d0adb9 --- /dev/null +++ b/advisories/_posts/2013-02-12-OSVDB-115090.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-115090 (bundler): Bundler Gem for Ruby Missing SSL Certificate Validation + MitM Spoofing' +comments: false +categories: +- bundler +advisory: + gem: bundler + osvdb: 115090 + url: https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8 + title: Bundler Gem for Ruby Missing SSL Certificate Validation MitM Spoofing + date: 2013-02-12 + description: | + Bundler Gem for Ruby contains a flaw as SSL certificates are not properly + validated. By spoofing the SSL server via a certificate that appears valid, + an attacker with the ability to intercept network traffic (e.g. MiTM, DNS + cache poisoning) can disclose and optionally manipulate transmitted data. + patched_versions: + - ">= 1.3.0.pre.8" + related: + url: + - https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8 + - https://my.diffend.io/gems/bundler/1.3.0.pre.7/1.3.0.pre.8 + - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8 + - http://www.osvdb.org/show/osvdb/115090 +--- diff --git a/advisories/_posts/2013-02-12-OSVDB-115091.md b/advisories/_posts/2013-02-12-OSVDB-115091.md new file mode 100644 index 00000000..5e306919 --- /dev/null +++ b/advisories/_posts/2013-02-12-OSVDB-115091.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-115091 (bundler): Bundler Gem for Ruby Redirection Remote HTTP Basic + Authentication Credential Disclosure' +comments: false +categories: +- bundler +advisory: + gem: bundler + osvdb: 115091 + url: https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8 + title: Bundler Gem for Ruby Redirection Remote HTTP Basic Authentication Credential + Disclosure + date: 2013-02-12 + description: | + Bundler Gem for Ruby contains a flaw that is triggered during the + redirection to other hosts. This may allow a remote attacker to + gain access to HTTP basic authentication credential information. + patched_versions: + - ">= 1.3.0.pre.8" + related: + url: + - https://github.com/rubygems/bundler/releases/tag/v1.3.0.pre.8 + - https://my.diffend.io/gems/bundler/1.3.0.pre.7/1.3.0.pre.8 + - https://my.diffend.io/gems/bundler/versions/1.0.0.beta.8 + - http://www.osvdb.org/show/osvdb/115091 +--- diff --git a/advisories/_posts/2013-02-19-CVE-2013-1756.md b/advisories/_posts/2013-02-19-CVE-2013-1756.md new file mode 100644 index 00000000..045386e7 --- /dev/null +++ b/advisories/_posts/2013-02-19-CVE-2013-1756.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-1756 (fog-dragonfly): Dragonfly Gem for Ruby Crafted Request Parsing + Remote Code Execution' +comments: false +categories: +- fog-dragonfly +advisory: + gem: fog-dragonfly + cve: 2013-1756 + osvdb: 90647 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1756 + title: Dragonfly Gem for Ruby Crafted Request Parsing Remote Code Execution + date: 2013-02-19 + description: | + Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing + of a specially crafted request. This may allow a remote attacker to execute + arbitrary code. + + This gem has been renamed. Please use "dragonfly" from now on. + cvss_v2: 7.5 + unaffected_versions: + - "< 0.7.0" + patched_versions: + - ">= 0.9.14" +--- diff --git a/advisories/_posts/2013-02-21-CVE-2013-0162.md b/advisories/_posts/2013-02-21-CVE-2013-0162.md new file mode 100644 index 00000000..0c9e6479 --- /dev/null +++ b/advisories/_posts/2013-02-21-CVE-2013-0162.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-0162 (ruby_parser): CVE-2013-0162 rubygem-ruby_parser: incorrect + temporary file usage' +comments: false +categories: +- ruby_parser +advisory: + gem: ruby_parser + cve: 2013-0162 + osvdb: 90561 + ghsa: 8mvw-22r7-w6fq + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0162 + title: 'CVE-2013-0162 rubygem-ruby_parser: incorrect temporary file usage' + date: 2013-02-21 + description: | + The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser + gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via + a symlink attack on a temporary file with a predictable name in /tmp. + cvss_v2: 2.1 + patched_versions: + - ">= 3.1.2" +--- diff --git a/advisories/_posts/2013-02-21-CVE-2013-1607.md b/advisories/_posts/2013-02-21-CVE-2013-1607.md new file mode 100644 index 00000000..1089ce24 --- /dev/null +++ b/advisories/_posts/2013-02-21-CVE-2013-1607.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-1607 (pdfkit): PDFKit Gem for Ruby PDF File Generation Parameter + Handling Remote Code Execution' +comments: false +categories: +- pdfkit +advisory: + gem: pdfkit + cve: 2013-1607 + osvdb: 90867 + ghsa: 39v7-xpq4-8884 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1607 + title: PDFKit Gem for Ruby PDF File Generation Parameter Handling Remote Code Execution + date: 2013-02-21 + description: | + PDFKit Gem for Ruby contains a flaw that is due to the program failing + to properly validate input during the handling of parameters when generating PDF + files. This may allow a remote attacker to potentially execute arbitrary code via + the pdfkit generation options. + cvss_v3: 9.8 + patched_versions: + - ">= 0.5.3" +--- diff --git a/advisories/_posts/2013-02-21-CVE-2013-1656.md b/advisories/_posts/2013-02-21-CVE-2013-1656.md new file mode 100644 index 00000000..b58773df --- /dev/null +++ b/advisories/_posts/2013-02-21-CVE-2013-1656.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-1656 (spree): Spree controller Parameter Arbitrary Ruby Object Instantiation + Command Execution' +comments: false +categories: +- spree +advisory: + gem: spree + cve: 2013-1656 + ghsa: jxx8-v83v-rhw3 + url: https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656 + title: Spree controller Parameter Arbitrary Ruby Object Instantiation Command Execution + date: 2013-02-21 + description: | + Spree Commerce 1.0.x through 1.3.2 allows remote authenticated + administrators to instantiate arbitrary Ruby objects and executd + arbitrary commands via the + (1) payment_method parameter to core/app/controllers/spree/admin/ + payment_methods_controller.rb; and the + (2) promotion_action parameter to promotion_actions_controller.rb, + (3) promotion_rule parameter to promotion_rules_controller.rb, and + (4) calculator_type parameter to promotions_controller.rb in + promo/app/controllers/spree/admin/, related to unsafe use + of the constantize function. + cvss_v2: 4.3 + patched_versions: + - ">= 2.0.0" + related: + url: + - https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed +--- diff --git a/advisories/_posts/2013-02-21-CVE-2013-2506.md b/advisories/_posts/2013-02-21-CVE-2013-2506.md new file mode 100644 index 00000000..f953232c --- /dev/null +++ b/advisories/_posts/2013-02-21-CVE-2013-2506.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2013-2506 (spree_auth_devise): Spree app/models/spree/user.rb Mass Role + Assignment Remote Privilege Escalation' +comments: false +categories: +- spree_auth_devise +advisory: + gem: spree_auth_devise + cve: 2013-2506 + osvdb: 90865 + ghsa: jp57-9j37-5476 + url: https://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed + title: Spree app/models/spree/user.rb Mass Role Assignment Remote Privilege Escalation + date: 2013-02-21 + description: | + Spree contains a flaw that leads to unauthorized privileges being gained. The + issue is triggered as certain input related to mass role assignment in + app/models/spree/user.rb is not properly verified before being used to update + a user. This may allow a remote attacker to assign arbitrary roles and gain + elevated administrative privileges. + cvss_v2: 4.0 + patched_versions: + - "~> 1.1.6" + - "~> 1.2.0" + - ">= 1.3.0" +--- diff --git a/advisories/_posts/2013-02-25-OSVDB-114854.md b/advisories/_posts/2013-02-25-OSVDB-114854.md new file mode 100644 index 00000000..d1ccbe3b --- /dev/null +++ b/advisories/_posts/2013-02-25-OSVDB-114854.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'OSVDB-114854 (activerecord-jdbc-adapter): ActiveRecord-JDBC-Adapter (AR-JDBC) + lib/arjdbc/jdbc/adapter.rb sql.gsub() Function SQL Injection' +comments: false +categories: +- activerecord-jdbc-adapter +- jruby +advisory: + gem: activerecord-jdbc-adapter + platform: jruby + osvdb: 114854 + url: https://github.com/jruby/activerecord-jdbc-adapter/issues/322 + title: ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub() + Function SQL Injection + date: 2013-02-25 + description: | + ActiveRecord-JDBC-Adapter (AR-JDBC) contains a flaw that may allow carrying + out an SQL injection attack. The issue is due to the sql.gsub() function in + lib/arjdbc/jdbc/adapter.rb not properly sanitizing user-supplied input before + using it in SQL queries. This may allow a remote attacker to inject or + manipulate SQL queries in the back-end database, allowing for the + manipulation or disclosure of arbitrary data. + unaffected_versions: + - "< 1.2.6" + patched_versions: + - ">= 1.2.8" + related: + url: + - https://github.com/jruby/activerecord-jdbc-adapter/issues/322 + - https://github.com/jruby/activerecord-jdbc-adapter/blob/master/lib/arjdbc/jdbc/adapter.rb + - https://security.snyk.io/vuln/SNYK-RUBY-ACTIVERECORDJDBCADAPTER-20076 + - https://my.diffend.io/gems/activerecord-jdbc-adapter/1.2.5/1.2.8 + - http://osvdb.org/show/osvdb/114854 +--- diff --git a/advisories/_posts/2013-02-28-CVE-2013-2512.md b/advisories/_posts/2013-02-28-CVE-2013-2512.md new file mode 100644 index 00000000..74ba5325 --- /dev/null +++ b/advisories/_posts/2013-02-28-CVE-2013-2512.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-2512 (ftpd): ftpd Gem for Ruby Shell Character Handling Remote Command + Injection' +comments: false +categories: +- ftpd +advisory: + gem: ftpd + cve: 2013-2512 + osvdb: 90784 + ghsa: 7vxr-6cxg-j3x8 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2512 + title: ftpd Gem for Ruby Shell Character Handling Remote Command Injection + date: 2013-02-28 + description: | + ftpd Gem for Ruby contains a flaw that is triggered when handling a + specially crafted option or filename that contains a shell + character. This may allow a remote attacker to inject arbitrary + commands. + cvss_v2: 9.0 + cvss_v3: 9.8 + patched_versions: + - ">= 0.2.2" +--- diff --git a/advisories/_posts/2013-02-28-CVE-2013-2516.md b/advisories/_posts/2013-02-28-CVE-2013-2516.md new file mode 100644 index 00000000..e2c2a29f --- /dev/null +++ b/advisories/_posts/2013-02-28-CVE-2013-2516.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-2516 (fileutils): fileutils Gem for Ruby file_utils.rb Crafted URL + Handling Remote Command Execution' +comments: false +categories: +- fileutils +advisory: + gem: fileutils + cve: 2013-2516 + osvdb: 90717 + ghsa: 9x97-x2p9-hvpf + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2516 + title: fileutils Gem for Ruby file_utils.rb Crafted URL Handling Remote Command + Execution + date: 2013-02-28 + description: | + fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is + triggered when handling a specially crafted URL containing a command after a delimiter + (;). This may allow a remote attacker to potentially execute arbitrary commands. + cvss_v3: 8.8 + patched_versions: + - ">= 0.7.1" +--- diff --git a/advisories/_posts/2013-03-04-CVE-2013-2513.md b/advisories/_posts/2013-03-04-CVE-2013-2513.md new file mode 100644 index 00000000..6451252e --- /dev/null +++ b/advisories/_posts/2013-03-04-CVE-2013-2513.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2013-2513 (flash_tool): flash_tool Gem for Ruby File Download Handling + Arbitrary Command Execution' +comments: false +categories: +- flash_tool +advisory: + gem: flash_tool + cve: 2013-2513 + osvdb: 90829 + ghsa: 6325-6g32-7p35 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2513 + title: flash_tool Gem for Ruby File Download Handling Arbitrary Command Execution + date: 2013-03-04 + description: | + flash_tool Gem for Ruby contains a flaw that is triggered during the + handling of downloaded files that contain shell characters. With a specially crafted + file, a context-dependent attacker can execute arbitrary commands. + cvss_v3: 9.8 +--- diff --git a/advisories/_posts/2013-03-12-CVE-2013-2616.md b/advisories/_posts/2013-03-12-CVE-2013-2616.md new file mode 100644 index 00000000..64acf68c --- /dev/null +++ b/advisories/_posts/2013-03-12-CVE-2013-2616.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-2616 (mini_magick): MiniMagick Gem for Ruby URI Handling Arbitrary + Command Injection' +comments: false +categories: +- mini_magick +advisory: + gem: mini_magick + cve: 2013-2616 + osvdb: 91231 + ghsa: w754-gq8r-pf5f + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2616 + title: MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection + date: 2013-03-12 + description: | + MiniMagick Gem for Ruby contains a flaw that is triggered during the handling + of specially crafted input from an untrusted source passed via a URL that + contains a ';' character. This may allow a context-dependent attacker to + potentially execute arbitrary commands. + cvss_v2: 9.3 + patched_versions: + - ">= 3.6.0" +--- diff --git a/advisories/_posts/2013-03-12-CVE-2013-2617.md b/advisories/_posts/2013-03-12-CVE-2013-2617.md new file mode 100644 index 00000000..45174d1b --- /dev/null +++ b/advisories/_posts/2013-03-12-CVE-2013-2617.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2013-2617 (curl): CVE-2013-2617 rubygem-curl: insufficient URL escaping + command injection' +comments: false +categories: +- curl +advisory: + gem: curl + cve: 2013-2617 + osvdb: 91230 + ghsa: hxx6-p24v-wg8c + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2617 + title: 'CVE-2013-2617 rubygem-curl: insufficient URL escaping command injection' + date: 2013-03-12 + description: | + lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute + arbitrary commands via shell metacharacters in a URL. + cvss_v2: 7.5 +--- diff --git a/advisories/_posts/2013-03-13-CVE-2013-2615.md b/advisories/_posts/2013-03-13-CVE-2013-2615.md new file mode 100644 index 00000000..416827ea --- /dev/null +++ b/advisories/_posts/2013-03-13-CVE-2013-2615.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-2615 (fastreader): fastreader Gem for Ruby URI Handling Arbitrary + Command Injection' +comments: false +categories: +- fastreader +advisory: + gem: fastreader + cve: 2013-2615 + osvdb: 91232 + ghsa: w248-xr37-jx8m + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2615 + title: fastreader Gem for Ruby URI Handling Arbitrary Command Injection + date: 2013-03-13 + description: | + fastreader Gem for Ruby contains a flaw that is triggered during the handling + of specially crafted input passed via a URL that contains a ';' character. + This may allow a context-dependent attacker to potentially execute arbitrary + commands. + cvss_v2: 9.3 +--- diff --git a/advisories/_posts/2013-03-18-CVE-2013-1875.md b/advisories/_posts/2013-03-18-CVE-2013-1875.md new file mode 100644 index 00000000..f4be2687 --- /dev/null +++ b/advisories/_posts/2013-03-18-CVE-2013-1875.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-1875 (command_wrap): command_wrap Gem for Ruby URI Handling Arbitrary + Command Injection' +comments: false +categories: +- command_wrap +advisory: + gem: command_wrap + cve: 2013-1875 + osvdb: 91450 + ghsa: p673-hjf2-pwfr + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1875 + title: command_wrap Gem for Ruby URI Handling Arbitrary Command Injection + date: 2013-03-18 + description: | + command_wrap Gem for Ruby contains a flaw that is triggered during the + handling of input passed via the URL that contains a semicolon character (;). This + will allow a remote attacker to inject arbitrary commands and have them executed + in the context of the user clicking it. + cvss_v2: 7.5 +--- diff --git a/advisories/_posts/2013-03-19-CVE-2013-1854.md b/advisories/_posts/2013-03-19-CVE-2013-1854.md new file mode 100644 index 00000000..86d1d241 --- /dev/null +++ b/advisories/_posts/2013-03-19-CVE-2013-1854.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2013-1854 (activerecord): CVE-2013-1854 rubygem-activerecord: attribute_dos + Symbol DoS vulnerability' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2013-1854 + osvdb: 91453 + ghsa: 3crr-9vmg-864v + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1854 + title: 'CVE-2013-1854 rubygem-activerecord: attribute_dos Symbol DoS vulnerability' + date: 2013-03-19 + description: | + The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x + before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash + keys to symbols, which allows remote attackers to cause a denial of service via + crafted input to a where method. A flaw was found in the way Ruby on Rails handled + hashes in certain queries. A remote attacker could use this flaw to perform a denial + of service (resource consumption) attack by sending specially crafted queries that + would result in the creation of Ruby symbols, which were never garbage collected. + cvss_v2: 7.8 + unaffected_versions: + - "~> 3.0.0" + patched_versions: + - "~> 2.3.18" + - "~> 3.1.12" + - ">= 3.2.13" +--- diff --git a/advisories/_posts/2013-03-19-CVE-2013-1855.md b/advisories/_posts/2013-03-19-CVE-2013-1855.md new file mode 100644 index 00000000..4e316e84 --- /dev/null +++ b/advisories/_posts/2013-03-19-CVE-2013-1855.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-1855 (actionpack): CVE-2013-1855 rubygem-actionpack: css_sanitization: + XSS vulnerability in sanitize_css' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-1855 + osvdb: 91452 + ghsa: q759-hwvc-m3jg + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1855 + title: 'CVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in + sanitize_css' + date: 2013-03-19 + description: | + The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb + in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before + 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, + which makes it easier for remote attackers to conduct cross-site scripting (XSS) + attacks via crafted Cascading Style Sheets (CSS) token sequences. A cross-site scripting + (XSS) flaw was found in Action Pack. A remote attacker could use this flaw to conduct + XSS attacks against users of an application using Action Pack. + cvss_v2: 4.3 + patched_versions: + - "~> 2.3.18" + - "~> 3.1.12" + - ">= 3.2.13" +--- diff --git a/advisories/_posts/2013-03-19-CVE-2013-1856.md b/advisories/_posts/2013-03-19-CVE-2013-1856.md new file mode 100644 index 00000000..03f4b13d --- /dev/null +++ b/advisories/_posts/2013-03-19-CVE-2013-1856.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2013-1856 (activesupport): XML Parsing Vulnerability affecting JRuby users' +comments: false +categories: +- activesupport +- rails +- jruby +advisory: + gem: activesupport + framework: rails + platform: jruby + cve: 2013-1856 + osvdb: 91451 + ghsa: 9c2j-593q-3g82 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1856 + title: XML Parsing Vulnerability affecting JRuby users + date: 2013-03-19 + description: | + The ActiveSupport XML parsing functionality supports multiple + pluggable backends. One backend supported for JRuby users is + ActiveSupport::XmlMini_JDOM which makes use of the + javax.xml.parsers.DocumentBuilder class. In some JVM configurations + the default settings of that class can allow an attacker to construct + XML which, when parsed, will contain the contents of arbitrary URLs + including files from the application server. They may also allow for + various denial of service attacks. Action Pack + cvss_v2: 7.8 + unaffected_versions: + - "~> 2.3.0" + patched_versions: + - "~> 3.1.12" + - ">= 3.2.13" +--- diff --git a/advisories/_posts/2013-03-19-CVE-2013-1857.md b/advisories/_posts/2013-03-19-CVE-2013-1857.md new file mode 100644 index 00000000..82abe151 --- /dev/null +++ b/advisories/_posts/2013-03-19-CVE-2013-1857.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2013-1857 (actionpack): CVE-2013-1857 rubygem-actionpack: sanitize_protocol: + XSS Vulnerability in the helper of Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-1857 + osvdb: 91454 + ghsa: j838-vfpq-fmf2 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1857 + title: 'CVE-2013-1857 rubygem-actionpack: sanitize_protocol: XSS Vulnerability in + the helper of Ruby on Rails' + date: 2013-03-19 + description: | + 'The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb + in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before + 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters + in URLs, which makes it easier for remote attackers to conduct cross-site scripting + (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence. + A cross-site scripting (XSS) flaw was found in Action Pack. A remote attacker could + use this flaw to conduct XSS attacks against users of an application using Action + Pack.' + cvss_v2: 4.3 + patched_versions: + - "~> 2.3.18" + - "~> 3.1.12" + - ">= 3.2.13" +--- diff --git a/advisories/_posts/2013-03-26-CVE-2013-1898.md b/advisories/_posts/2013-03-26-CVE-2013-1898.md new file mode 100644 index 00000000..aa198318 --- /dev/null +++ b/advisories/_posts/2013-03-26-CVE-2013-1898.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1898 (thumbshooter): Thumbshooter Gem for Ruby thumbshooter.rb URL + Shell Metacharacter Injection Arbitrary Command Execution' +comments: false +categories: +- thumbshooter +advisory: + gem: thumbshooter + cve: 2013-1898 + osvdb: 91839 + ghsa: 7fqj-cg79-f2pv + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1898 + title: Thumbshooter Gem for Ruby thumbshooter.rb URL Shell Metacharacter Injection + Arbitrary Command Execution + date: 2013-03-26 + description: | + Thumbshooter Gem for Ruby contains a flaw that is due to the program + failing to properly sanitize input passed to thumbshooter.rb. With a specially crafted + URL that contains shell metacharacters, a context-dependent attacker can execute + arbitrary commands. + cvss_v2: 7.5 +--- diff --git a/advisories/_posts/2013-04-01-CVE-2013-1911.md b/advisories/_posts/2013-04-01-CVE-2013-1911.md new file mode 100644 index 00000000..6ff4038b --- /dev/null +++ b/advisories/_posts/2013-04-01-CVE-2013-1911.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1911 (ldoce): ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection + Arbitrary Command Execution' +comments: false +categories: +- ldoce +advisory: + gem: ldoce + cve: 2013-1911 + osvdb: 91870 + ghsa: g266-3crh-h7gj + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1911 + title: ldoce Gem for Ruby MP3 URL Shell Metacharacter Injection Arbitrary Command + Execution + date: 2013-04-01 + description: | + ldoce Gem for Ruby contains a flaw that is triggered during the handling + of a specially crafted URL or filename for MP3 files that have shell metacharacters + injected in to it. This may allow a context-dependent attacker to execute arbitrary + commands. + cvss_v2: 6.8 +--- diff --git a/advisories/_posts/2013-04-04-CVE-2013-1947.md b/advisories/_posts/2013-04-04-CVE-2013-1947.md new file mode 100644 index 00000000..c251c682 --- /dev/null +++ b/advisories/_posts/2013-04-04-CVE-2013-1947.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1947 (kelredd-pruview): kelredd-pruview Gem for Ruby /lib/pruview/document.rb + File Name Shell Metacharacter Injection Arbitrary Command Execution' +comments: false +categories: +- kelredd-pruview +advisory: + gem: kelredd-pruview + cve: 2013-1947 + osvdb: 92228 + ghsa: 78j3-7wpm-qhvp + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1947 + title: kelredd-pruview Gem for Ruby /lib/pruview/document.rb File Name Shell Metacharacter + Injection Arbitrary Command Execution + date: 2013-04-04 + description: | + kelredd-pruview Gem for Ruby contains a flaw in /lib/pruview/document.rb. + The issue is triggered during the handling of a specially crafted file name that + contains injected shell metacharacters. This may allow a context-dependent attacker + to potentially execute arbitrary commands. + cvss_v2: 9.3 +--- diff --git a/advisories/_posts/2013-04-08-CVE-2013-1933.md b/advisories/_posts/2013-04-08-CVE-2013-1933.md new file mode 100644 index 00000000..caf7e665 --- /dev/null +++ b/advisories/_posts/2013-04-08-CVE-2013-1933.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1933 (karteek-docsplit): Karteek Docsplit Gem for Ruby text_extractor.rb + File Name Shell Metacharacter Injection Arbitrary Command Execution' +comments: false +categories: +- karteek-docsplit +advisory: + gem: karteek-docsplit + cve: 2013-1933 + osvdb: 92117 + ghsa: 4fvg-pwv7-v54g + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1933 + title: Karteek Docsplit Gem for Ruby text_extractor.rb File Name Shell Metacharacter + Injection Arbitrary Command Execution + date: 2013-04-08 + description: | + Karteek Docsplit Gem for Ruby contains a flaw that is due to the program + failing to properly sanitize input passed to text_extractor.rb. With a specially + crafted file name that contains shell metacharacters, a context-dependent attacker + can execute arbitrary commands + cvss_v2: 9.3 +--- diff --git a/advisories/_posts/2013-04-13-CVE-2013-1948.md b/advisories/_posts/2013-04-13-CVE-2013-1948.md new file mode 100644 index 00000000..450fe12a --- /dev/null +++ b/advisories/_posts/2013-04-13-CVE-2013-1948.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-1948 (md2pdf): md2pdf Gem for Ruby md2pdf/converter.rb File Name + Shell Metacharacter Injection Arbitrary Command Execution' +comments: false +categories: +- md2pdf +advisory: + gem: md2pdf + cve: 2013-1948 + osvdb: 92290 + ghsa: 99ch-8mvp-g7m5 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-1948 + title: md2pdf Gem for Ruby md2pdf/converter.rb File Name Shell Metacharacter Injection + Arbitrary Command Execution + date: 2013-04-13 + description: | + md2pdf Gem for Ruby contains a flaw that is due to the program failing + to properly sanitize input passed to md2pdf/converter.rb. With a specially crafted + file name that contains shell metacharacters, a context-dependent attacker can execute + arbitrary commands + cvss_v2: 10.0 +--- diff --git a/advisories/_posts/2013-05-14-CVE-2013-2090.md b/advisories/_posts/2013-05-14-CVE-2013-2090.md new file mode 100644 index 00000000..6dc514c6 --- /dev/null +++ b/advisories/_posts/2013-05-14-CVE-2013-2090.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-2090 (cremefraiche): Creme Fraiche Gem for Ruby File Name Shell Metacharacter + Injection Arbitrary Command Execution' +comments: false +categories: +- cremefraiche +advisory: + gem: cremefraiche + cve: 2013-2090 + osvdb: 93395 + ghsa: m6f7-46hw-grcj + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2090 + title: Creme Fraiche Gem for Ruby File Name Shell Metacharacter Injection Arbitrary + Command Execution + date: 2013-05-14 + description: | + Creme Fraiche Gem for Ruby contains a flaw that is due to the program + failing to properly sanitize input in file names. With a specially crafted file + name that contains shell metacharacters, a context-dependent attacker can execute + arbitrary commands + cvss_v2: 9.3 + patched_versions: + - ">= 0.6.1" +--- diff --git a/advisories/_posts/2013-05-17-CVE-2013-2105.md b/advisories/_posts/2013-05-17-CVE-2013-2105.md new file mode 100644 index 00000000..40bf3775 --- /dev/null +++ b/advisories/_posts/2013-05-17-CVE-2013-2105.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2013-2105 (show_in_browser): Show In Browser Gem for Ruby /tmp/browser.html + Arbitrary Script Injection' +comments: false +categories: +- show_in_browser +advisory: + gem: show_in_browser + cve: 2013-2105 + osvdb: 93490 + ghsa: 9hx9-w2j6-rw76 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2105 + title: Show In Browser Gem for Ruby /tmp/browser.html Arbitrary Script Injection + date: 2013-05-17 + description: | + Show In Browser Gem for Ruby contains a flaw that is triggered when the + application does not validate input passed via the /tmp/browser.html file. This + may allow a local attacker to create a specially crafted request that would execute + arbitrary script code in a user's browser. +--- diff --git a/advisories/_posts/2013-05-29-CVE-2013-2119.md b/advisories/_posts/2013-05-29-CVE-2013-2119.md new file mode 100644 index 00000000..1bf5f5f8 --- /dev/null +++ b/advisories/_posts/2013-05-29-CVE-2013-2119.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-2119 (passenger): CVE-2013-2119 rubygem-passenger: incorrect temporary + file usage' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2013-2119 + osvdb: 93752 + ghsa: 9qj7-jvg4-qr2x + url: https://nvd.nist.gov/vuln/detail/CVE-2013-2119 + title: 'CVE-2013-2119 rubygem-passenger: incorrect temporary file usage' + date: 2013-05-29 + description: | + Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows + local users to cause a denial of service (prevent application start) or gain privileges + by pre-creating a temporary "config" file in a directory with a predictable name + in /tmp/ before it is used by the gem. + cvss_v2: 4.6 + patched_versions: + - "~> 3.0.21" + - ">= 4.0.5" +--- diff --git a/advisories/_posts/2013-06-10-CVE-2013-4136.md b/advisories/_posts/2013-06-10-CVE-2013-4136.md new file mode 100644 index 00000000..20a20898 --- /dev/null +++ b/advisories/_posts/2013-06-10-CVE-2013-4136.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-4136 (passenger): CVE-2013-4136 rubygem-passenger: insecure temporary + directory usage due toreuse of existing server instance directories' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2013-4136 + osvdb: 94074 + ghsa: w6rc-q387-vpgq + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4136 + title: 'CVE-2013-4136 rubygem-passenger: insecure temporary directory usage due + toreuse of existing server instance directories' + date: 2013-06-10 + description: | + ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 + for Ruby allows local users to gain privileges or possibly change the ownership + of arbitrary directories via a symlink attack on a directory with a predictable + name in /tmp/. + cvss_v2: 4.6 + patched_versions: + - ">= 4.0.8" +--- diff --git a/advisories/_posts/2013-06-26-OSVDB-94679.md b/advisories/_posts/2013-06-26-OSVDB-94679.md new file mode 100644 index 00000000..15a5a88c --- /dev/null +++ b/advisories/_posts/2013-06-26-OSVDB-94679.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'OSVDB-94679 (enum_column3): enum_column3 Gem for Ruby Symbol Creation Remote + DoS' +comments: false +categories: +- enum_column3 +advisory: + gem: enum_column3 + osvdb: 94679 + url: https://security.snyk.io/vuln/SNYK-RUBY-ENUMCOLUMN3-20100 + title: enum_column3 Gem for Ruby Symbol Creation Remote DoS + date: 2013-06-26 + description: | + The enum_column3 Gem for Ruby contains a flaw that may allow a remote + denial of service. The issue is due to the program typecasting unexpected + strings to symbols. This may allow a remote attacker to crash the program. + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-ENUMCOLUMN3-20100 + - http://osvdb.org/show/osvdb/94679 + notes: Never patched +--- diff --git a/advisories/_posts/2013-07-09-CVE-2014-2538.md b/advisories/_posts/2013-07-09-CVE-2014-2538.md new file mode 100644 index 00000000..c382be2b --- /dev/null +++ b/advisories/_posts/2013-07-09-CVE-2014-2538.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-2538 (rack-ssl): CVE-2014-2538 rubygem rack-ssl: URL error display + XSS' +comments: false +categories: +- rack-ssl +advisory: + gem: rack-ssl + cve: 2014-2538 + osvdb: 104734 + ghsa: v3rr-cph9-2g2q + url: https://nvd.nist.gov/vuln/detail/CVE-2014-2538 + title: 'CVE-2014-2538 rubygem rack-ssl: URL error display XSS' + date: 2013-07-09 + description: | + Cross-site scripting (XSS) vulnerability in lib/rack/ssl.rb in the rack-ssl + gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script + or HTML via a URI, which might not be properly handled by third-party adapters such + as JRuby-Rack. + cvss_v2: 4.3 + patched_versions: + - ">= 1.3.4" +--- diff --git a/advisories/_posts/2013-07-25-CVE-2013-4170.md b/advisories/_posts/2013-07-25-CVE-2013-4170.md new file mode 100644 index 00000000..d8ee9c04 --- /dev/null +++ b/advisories/_posts/2013-07-25-CVE-2013-4170.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2013-4170 (ember-source): Ember.js Potential XSS Exploit When Binding + `tagName` to User-Supplied Data' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2013-4170 + ghsa: 5m48-c37x-f792 + url: https://groups.google.com/forum/#!topic/ember-security/dokLVwwxAdM + title: Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data + date: 2013-07-25 + description: | + In general, Ember.js escapes or strips any user-supplied content + before inserting it in strings that will be sent to innerHTML. + However, the `tagName` property of an `Ember.View` was inserted into + such a string without being sanitized. This means that if an + application assigns a view's `tagName` to user-supplied data, a + specially-crafted payload could execute arbitrary JavaScript in the + context of the current domain ("XSS"). + + This vulnerability only affects applications that assign or bind + user-provided content to `tagName`. + cvss_v3: 6.1 + patched_versions: + - "~> 1.0.0.rc1.1" + - "~> 1.0.0.rc2.1" + - "~> 1.0.0.rc3.1" + - "~> 1.0.0.rc4.1" + - "~> 1.0.0.rc5.1" + - ">= 1.0.0.rc6.1" +--- diff --git a/advisories/_posts/2013-08-02-CVE-2013-4203.md b/advisories/_posts/2013-08-02-CVE-2013-4203.md new file mode 100644 index 00000000..11e25d4f --- /dev/null +++ b/advisories/_posts/2013-08-02-CVE-2013-4203.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-4203 (rgpg): rgpg Gem for Ruby lib/rgpg/gpg_helper.rb Remote Command + Execution' +comments: false +categories: +- rgpg +advisory: + gem: rgpg + cve: 2013-4203 + osvdb: 95948 + ghsa: jg4m-q6w8-vrjp + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4203 + title: rgpg Gem for Ruby lib/rgpg/gpg_helper.rb Remote Command Execution + date: 2013-08-02 + description: | + rgpg Gem for Ruby contains a flaw in the GpgHelper module + (lib/rgpg/gpg_helper.rb). The issue is due to the program failing to properly + sanitize user-supplied input before being used in the system() function for + execution. This may allow a remote attacker to execute arbitrary commands. + cvss_v2: 7.5 + patched_versions: + - ">= 0.2.3" +--- diff --git a/advisories/_posts/2013-08-02-OSVDB-114435.md b/advisories/_posts/2013-08-02-OSVDB-114435.md new file mode 100644 index 00000000..c7deec48 --- /dev/null +++ b/advisories/_posts/2013-08-02-OSVDB-114435.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-114435 (devise): CSRF token fixation attacks in Devise' +comments: false +categories: +- devise +advisory: + gem: devise + osvdb: 114435 + url: http://blog.plataformatec.com.br/2013/08/csrf-token-fixation-attacks-in-devise/ + title: CSRF token fixation attacks in Devise + date: 2013-08-02 + description: | + Devise contains a flaw that allows a remote, user-assisted attacker to + conduct a CSRF token fixation attack. This issue is triggered as previous + CSRF tokens are not properly invalidated when a new token is created. + If an attacker has knowledge of said token, a specially crafted request can + be made to it, allowing the attacker to conduct CSRF attacks. + patched_versions: + - "~> 2.2.5" + - ">= 3.0.1" + related: + url: + - http://blog.plataformatec.com.br/2013/08/csrf-token-fixation-attacks-in-devise + - https://github.com/heartcombo/devise/commit/747751a20f50aa8814dcd3eb9a3648f00ab6a707 + - https://github.com/heartcombo/devise/compare/v3.0.0...v3.0.1 + - https://my.diffend.io/gems/devise/3.0.0/3.0.1 + - https://security.snyk.io/vuln/SNYK-RUBY-DEVISE-20103 +--- diff --git a/advisories/_posts/2013-08-03-OSVDB-96425.md b/advisories/_posts/2013-08-03-OSVDB-96425.md new file mode 100644 index 00000000..4632e2c7 --- /dev/null +++ b/advisories/_posts/2013-08-03-OSVDB-96425.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-96425 (redis-namespace): redis-namespace Gem for Ruby contains a flaw + in the method_missing implementation' +comments: false +categories: +- redis-namespace +advisory: + gem: redis-namespace + osvdb: 96425 + url: http://blog.steveklabnik.com/posts/2013-08-03-redis-namespace-1-3-1--security-release + title: redis-namespace Gem for Ruby contains a flaw in the method_missing implementation + date: 2013-08-03 + description: | + redis-namespace Gem for Ruby contains a flaw in the method_missing implementation. + The issue is triggered when handling exec commands called via send(). This may allow a + remote attacker to execute arbitrary commands. + patched_versions: + - "~> 1.0.4" + - "~> 1.1.1" + - "~> 1.2.2" + - ">= 1.3.1" + related: + url: + - http://blog.steveklabnik.com/posts/2013-08-03-redis-namespace-1-3-1--security-release + - https://github.com/resque/redis-namespace/issues/65 + - https://github.com/resque/redis-namespace/commit/6d839515e8a3fdc17b5fb391500fda3f919689d6 + - https://security.snyk.io/vuln/SNYK-RUBY-REDISNAMESPACE-20105 +--- diff --git a/advisories/_posts/2013-08-14-CVE-2013-5647.md b/advisories/_posts/2013-08-14-CVE-2013-5647.md new file mode 100644 index 00000000..5295bfc6 --- /dev/null +++ b/advisories/_posts/2013-08-14-CVE-2013-5647.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-5647 (sounder): Sounder Gem for Ruby File Name Handling Arbitrary + Command Execution' +comments: false +categories: +- sounder +advisory: + gem: sounder + cve: 2013-5647 + osvdb: 96278 + ghsa: rfmf-rx8w-935w + url: https://nvd.nist.gov/vuln/detail/CVE-2013-5647 + title: Sounder Gem for Ruby File Name Handling Arbitrary Command Execution + date: 2013-08-14 + description: | + Sounder Gem for Ruby contains a flaw that is triggered during the handling + of file names. This may allow a context-dependent attacker to execute + arbitrary commands. + cvss_v2: 7.5 + patched_versions: + - ">= 1.0.2" +--- diff --git a/advisories/_posts/2013-09-01-CVE-2013-4318.md b/advisories/_posts/2013-09-01-CVE-2013-4318.md new file mode 100644 index 00000000..665a268e --- /dev/null +++ b/advisories/_posts/2013-09-01-CVE-2013-4318.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-4318 (features): Features Gem for Ruby /tmp/out.html Local XSS' +comments: false +categories: +- features +advisory: + gem: features + cve: 2013-4318 + osvdb: 96975 + ghsa: 42gq-h7xj-33r4 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4318 + title: Features Gem for Ruby /tmp/out.html Local XSS + date: 2013-09-01 + description: | + Features Gem for Ruby contains a flaw that allows a local cross-site + scripting (XSS) attack. This flaw exists because the application does not validate + certain input upon submission to /tmp/out.html. This may allow an attacker to create + a specially crafted request that would execute arbitrary script code in a user's + browser within the trust relationship between their browser and the server. + cvss_v3: 5.4 +--- diff --git a/advisories/_posts/2013-09-03-CVE-2013-5671.md b/advisories/_posts/2013-09-03-CVE-2013-5671.md new file mode 100644 index 00000000..d5badd47 --- /dev/null +++ b/advisories/_posts/2013-09-03-CVE-2013-5671.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-5671 (fog-dragonfly): fog-dragonfly Gem for Ruby imagemagickutils.rb + Remote Command Execution' +comments: false +categories: +- fog-dragonfly +advisory: + gem: fog-dragonfly + cve: 2013-5671 + osvdb: 96798 + ghsa: qrgf-jqqm-x7xv + url: https://nvd.nist.gov/vuln/detail/CVE-2013-5671 + title: fog-dragonfly Gem for Ruby imagemagickutils.rb Remote Command Execution + date: 2013-09-03 + description: | + fog-dragonfly Gem for Ruby contains a flaw that is due to the program + failing to properly sanitize input passed via the imagemagickutils.rb script. + This may allow a remote attacker to execute arbitrary commands. + + This gem has been renamed. Please use "dragonfly" from now on. + cvss_v2: 7.5 + patched_versions: + - ">= 0.8.4" +--- diff --git a/advisories/_posts/2013-09-09-CVE-2013-4287.md b/advisories/_posts/2013-09-09-CVE-2013-4287.md new file mode 100644 index 00000000..06ac347d --- /dev/null +++ b/advisories/_posts/2013-09-09-CVE-2013-4287.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2013-4287 (rubygems-update): CVE-2013-4287 rubygems: version regex algorithmic + complexity vulnerability' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2013-4287 + osvdb: 97163 + ghsa: 9j7m-rjqx-48vh + url: http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html + title: 'CVE-2013-4287 rubygems: version regex algorithmic complexity vulnerability' + date: 2013-09-09 + description: | + Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN + in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x + before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows + remote attackers to cause a denial of service (CPU consumption) via a crafted gem + version that triggers a large amount of backtracking in a regular expression. + cvss_v2: 4.3 + patched_versions: + - "~> 1.8.23.1" + - "~> 1.8.26" + - "~> 2.0.8" + - ">= 2.1.0" +--- diff --git a/advisories/_posts/2013-09-19-CVE-2013-6459.md b/advisories/_posts/2013-09-19-CVE-2013-6459.md new file mode 100644 index 00000000..9aba717e --- /dev/null +++ b/advisories/_posts/2013-09-19-CVE-2013-6459.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-6459 (will_paginate): CVE-2013-6459 rubygem-will_paginate: XSS vulnerabilities' +comments: false +categories: +- will_paginate +advisory: + gem: will_paginate + cve: 2013-6459 + osvdb: 101138 + ghsa: 8r6h-7x9g-xmw9 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-6459 + title: 'CVE-2013-6459 rubygem-will_paginate: XSS vulnerabilities' + date: 2013-09-19 + description: | + Cross-site scripting (XSS) vulnerability in the will_paginate gem before + 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via + vectors involving generated pagination links. It was found that ruby will_paginate + is vulnerable to a XSS via malformed input that cause pagination to occur on an + improper boundary. This could allow an attacker with the ability to pass data to + the will_paginate gem to display arbitrary HTML including scripting code within + the web interface. + cvss_v2: 4.3 + patched_versions: + - ">= 3.0.5" +--- diff --git a/advisories/_posts/2013-09-24-CVE-2013-4363.md b/advisories/_posts/2013-09-24-CVE-2013-4363.md new file mode 100644 index 00000000..ca1b57cb --- /dev/null +++ b/advisories/_posts/2013-09-24-CVE-2013-4363.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-4363 (rubygems-update): CVE-2013-4363 rubygems: version regex algorithmic + complexity vulnerability, incomplete CVE-2013-4287 fix' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2013-4363 + osvdb: 97163 + ghsa: 9qvm-2vhf-q649 + url: http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html + title: 'CVE-2013-4363 rubygems: version regex algorithmic complexity vulnerability, + incomplete CVE-2013-4287 fix' + date: 2013-09-24 + description: | + 'Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN + in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x + before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, + allows remote attackers to cause a denial of service (CPU consumption) via a crafted + gem version that triggers a large amount of backtracking in a regular expression. NOTE: + this issue is due to an incomplete fix for CVE-2013-4287.' + cvss_v2: 4.3 + patched_versions: + - "~> 1.8.23.2" + - "~> 1.8.27" + - "~> 2.0.10" + - ">= 2.1.5" +--- diff --git a/advisories/_posts/2013-10-01-CVE-2013-7463.md b/advisories/_posts/2013-10-01-CVE-2013-7463.md new file mode 100644 index 00000000..099c1ec0 --- /dev/null +++ b/advisories/_posts/2013-10-01-CVE-2013-7463.md @@ -0,0 +1,19 @@ +--- +layout: advisory +title: 'CVE-2013-7463 (aescrypt): Vulnerability in aescrypt because IV is not randomized' +comments: false +categories: +- aescrypt +advisory: + gem: aescrypt + cve: 2013-7463 + ghsa: 4c4w-3q45-hp9j + url: https://github.com/Gurpartap/aescrypt/issues/4 + title: Vulnerability in aescrypt because IV is not randomized + date: 2013-10-01 + description: | + The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the + AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to + defeat cryptographic protection mechanisms via a chosen plaintext attack. + cvss_v3: 7.5 +--- diff --git a/advisories/_posts/2013-10-08-CVE-2013-4413.md b/advisories/_posts/2013-10-08-CVE-2013-4413.md new file mode 100644 index 00000000..34e204fa --- /dev/null +++ b/advisories/_posts/2013-10-08-CVE-2013-4413.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-4413 (wicked): Wicked Gem for Ruby contains a flaw' +comments: false +categories: +- wicked +advisory: + gem: wicked + cve: 2013-4413 + osvdb: 98270 + ghsa: rprj-g6xc-p5gq + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4413 + title: Wicked Gem for Ruby contains a flaw + date: 2013-10-08 + description: | + Wicked Gem for Ruby contains a flaw that is due to the program failing + to properly sanitize input passed via the 'the_step' parameter upon submission to + the render_redirect.rb script. This may allow a remote attacker to gain access to + arbitrary files. + cvss_v2: 5.0 + patched_versions: + - ">= 1.0.1" +--- diff --git a/advisories/_posts/2013-10-16-CVE-2013-4389.md b/advisories/_posts/2013-10-16-CVE-2013-4389.md new file mode 100644 index 00000000..5f30e922 --- /dev/null +++ b/advisories/_posts/2013-10-16-CVE-2013-4389.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-4389 (actionmailer): CVE-2013-4389 rubygem-actionmailer: email address + processing DoS' +comments: false +categories: +- actionmailer +- rails +advisory: + gem: actionmailer + framework: rails + cve: 2013-4389 + osvdb: 98629 + ghsa: rg5m-3fqp-6px8 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4389 + title: 'CVE-2013-4389 rubygem-actionmailer: email address processing DoS' + date: 2013-10-16 + description: | + Multiple format string vulnerabilities in log_subscriber.rb files in + the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 + allow remote attackers to cause a denial of service via a crafted e-mail address + that is improperly handled during construction of a log message. + cvss_v2: 4.3 + unaffected_versions: + - "~> 2.3.2" + patched_versions: + - ">= 3.2.15" +--- diff --git a/advisories/_posts/2013-10-22-CVE-2013-4457.md b/advisories/_posts/2013-10-22-CVE-2013-4457.md new file mode 100644 index 00000000..54929fc4 --- /dev/null +++ b/advisories/_posts/2013-10-22-CVE-2013-4457.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-4457 (cocaine): Cocaine Gem for Ruby contains a flaw' +comments: false +categories: +- cocaine +advisory: + gem: cocaine + cve: 2013-4457 + osvdb: 98835 + ghsa: c43v-hrmg-56r4 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4457 + title: Cocaine Gem for Ruby contains a flaw + date: 2013-10-22 + description: | + Cocaine Gem for Ruby contains a flaw that is due to the method of variable + interpolation used by the program. With a specially crafted object, a context-dependent + attacker can execute arbitrary commands. + cvss_v2: 6.8 + unaffected_versions: + - "< 0.4.0" + patched_versions: + - ">= 0.5.3" +--- diff --git a/advisories/_posts/2013-10-29-CVE-2013-4478.md b/advisories/_posts/2013-10-29-CVE-2013-4478.md new file mode 100644 index 00000000..a84855cb --- /dev/null +++ b/advisories/_posts/2013-10-29-CVE-2013-4478.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2013-4478 (sup): Sup wrongly handled the filename of attachments' +comments: false +categories: +- sup +advisory: + gem: sup + cve: 2013-4478 + osvdb: 99074 + ghsa: 5f2p-6vjv-2q2m + url: https://web.archive.org/web/20140524012714/http://rubyforge.org/pipermail/sup-talk/2013-August/004993.html + title: Sup wrongly handled the filename of attachments + date: 2013-10-29 + description: | + Sup MUA contains a flaw that is triggered when handling email attachment + content. This may allow a context-dependent attacker to execute arbitrary commands. + cvss_v2: 6.8 + patched_versions: + - "~> 0.13.2.1" + - ">= 0.14.1.1" + related: + cve: + - 2013-4479 + ghsa: + - hh2x-7mf9-78fr + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-4478 + - https://github.com/sup-heliotrope/sup/blob/develop/History.txt + - https://www.openwall.com/lists/oss-security/2013/10/30/2 + - https://web.archive.org/web/20140524012714/http://rubyforge.org/pipermail/sup-talk/2013-August/004993.html + - https://github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785 + - https://www.mend.io/vulnerability-database/CVE-2013-4478 + - https://security-tracker.debian.org/tracker/CVE-2013-4478 + - https://lwn.net/Articles/575351 + - https://github.com/advisories/GHSA-5f2p-6vjv-2q2m +--- diff --git a/advisories/_posts/2013-10-29-CVE-2013-4479.md b/advisories/_posts/2013-10-29-CVE-2013-4479.md new file mode 100644 index 00000000..f20cefc5 --- /dev/null +++ b/advisories/_posts/2013-10-29-CVE-2013-4479.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2013-4479 (sup): Sup did not sanitize the content-type of attachments' +comments: false +categories: +- sup +advisory: + gem: sup + cve: 2013-4479 + osvdb: 99074 + ghsa: hh2x-7mf9-78fr + url: https://web.archive.org/web/20140524005344/http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html + title: Sup did not sanitize the content-type of attachments + date: 2013-10-29 + description: | + Sup MUA contains a flaw that is triggered when handling email attachment + content. This may allow a context-dependent attacker to execute arbitrary commands. + cvss_v2: 6.8 + patched_versions: + - "~> 0.13.2.1" + - ">= 0.14.1.1" + related: + cve: + - 2013-4478 + ghsa: + - 5f2p-6vjv-2q2m + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-4479 + - https://web.archive.org/web/20140524005344/http://rubyforge.org/pipermail/sup-talk/2013-October/004996.html + - https://seclists.org/fulldisclosure/2013/Oct/272 + - https://seclists.org/fulldisclosure/2013/Oct/att-272/whatsup.txt + - https://www.openwall.com/lists/oss-security/2013/10/30/2 + - https://github.com/sup-heliotrope/sup/commit/ca0302e0c716682d2de22e9136400c704cc93e42 + - https://security-tracker.debian.org/tracker/CVE-2013-4479 + - https://lwn.net/Articles/575351 + - https://github.com/advisories/GHSA-hh2x-7mf9-78fr +--- diff --git a/advisories/_posts/2013-11-04-CVE-2013-4489.md b/advisories/_posts/2013-11-04-CVE-2013-4489.md new file mode 100644 index 00000000..ed152222 --- /dev/null +++ b/advisories/_posts/2013-11-04-CVE-2013-4489.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-4489 (gitlab-grit): GitLab Grit Gem for Ruby contains a flaw' +comments: false +categories: +- gitlab-grit +advisory: + gem: gitlab-grit + cve: 2013-4489 + osvdb: 99370 + ghsa: 95xq-v4m2-fq3r + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4489 + title: GitLab Grit Gem for Ruby contains a flaw + date: 2013-11-04 + description: | + GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb + script. The issue is triggered when input passed via the code search box is not + properly sanitized, which allows strings to be evaluated by the Bourne shell. This + may allow a remote attacker to execute arbitrary commands. + patched_versions: + - ">= 2.6.1" +--- diff --git a/advisories/_posts/2013-11-12-CVE-2013-4562.md b/advisories/_posts/2013-11-12-CVE-2013-4562.md new file mode 100644 index 00000000..e9bfd096 --- /dev/null +++ b/advisories/_posts/2013-11-12-CVE-2013-4562.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-4562 (omniauth-facebook): omniauth-facebook Gem for Ruby Unspecified + CSRF' +comments: false +categories: +- omniauth-facebook +advisory: + gem: omniauth-facebook + cve: 2013-4562 + osvdb: 99693 + ghsa: cf36-985g-v73c + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4562 + title: omniauth-facebook Gem for Ruby Unspecified CSRF + date: 2013-11-12 + description: | + omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not + require multiple steps, explicit confirmation, or a unique token when + performing certain sensitive actions. By tricking a user into following + a specially crafted link, a context-dependent attacker can perform a + Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to + perform an unspecified action. + cvss_v2: 6.8 + unaffected_versions: + - "<= 1.4.0" + patched_versions: + - ">= 1.5.0" +--- diff --git a/advisories/_posts/2013-11-14-CVE-2013-4593.md b/advisories/_posts/2013-11-14-CVE-2013-4593.md new file mode 100644 index 00000000..44e1d4e5 --- /dev/null +++ b/advisories/_posts/2013-11-14-CVE-2013-4593.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-4593 (omniauth-facebook): omniauth-facebook Gem for Ruby Insecure + Access Token Handling Authentication Bypass' +comments: false +categories: +- omniauth-facebook +advisory: + gem: omniauth-facebook + cve: 2013-4593 + osvdb: 99888 + ghsa: 33vg-hpx5-pfxg + url: https://nvd.nist.gov/vuln/detail/CVE-2013-4593 + title: omniauth-facebook Gem for Ruby Insecure Access Token Handling Authentication + Bypass + date: 2013-11-14 + description: | + omniauth-facebook Gem for Ruby contains a flaw that is due to the application + supporting passing the access token via the URL. This may allow a remote + attacker to bypass authentication and authenticate as another user. + cvss_v2: 6.8 + cvss_v3: 7.5 + patched_versions: + - ">= 1.5.1" +--- diff --git a/advisories/_posts/2013-12-02-CVE-2013-6421.md b/advisories/_posts/2013-12-02-CVE-2013-6421.md new file mode 100644 index 00000000..3a2e11c4 --- /dev/null +++ b/advisories/_posts/2013-12-02-CVE-2013-6421.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-6421 (sprout): sprout Gem for Ruby archive_unpacker.rb unpack_zip() + Function Multiple Parameter Arbitrary Code Execution' +comments: false +categories: +- sprout +advisory: + gem: sprout + cve: 2013-6421 + osvdb: 100598 + ghsa: 229r-pqp6-8w6g + url: https://nvd.nist.gov/vuln/detail/CVE-2013-6421 + title: sprout Gem for Ruby archive_unpacker.rb unpack_zip() Function Multiple Parameter + Arbitrary Code Execution + date: 2013-12-02 + description: | + sprout Gem for Ruby contains a flaw in the unpack_zip() function in + archive_unpacker.rb. The issue is due to the program failing to properly + sanitize input passed via the 'zip_file', 'dir', 'zip_name', and 'output' + parameters. This may allow a context-dependent attacker to execute arbitrary + code. + cvss_v2: 7.5 + unaffected_versions: + - "< 0.7.246" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-4491.md b/advisories/_posts/2013-12-03-CVE-2013-4491.md new file mode 100644 index 00000000..ee41ff4e --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-4491.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-4491 (actionpack): Reflective XSS Vulnerability in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-4491 + osvdb: 100528 + ghsa: 699m-mcjm-9cw8 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998 + title: Reflective XSS Vulnerability in Ruby on Rails + date: 2013-12-03 + description: | + There is a vulnerability in the internationalization component of Ruby on + Rails. Under certain common configurations an attacker can provide specially + crafted input which will execute a reflective XSS attack. + + The root cause of this issue is a vulnerability in the i18n gem which has + been assigned the identifier CVE-2013-4492. + cvss_v2: 4.3 + patched_versions: + - "~> 3.2.16" + - ">= 4.0.2" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-4492.md b/advisories/_posts/2013-12-03-CVE-2013-4492.md new file mode 100644 index 00000000..0e151cda --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-4492.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-4492 (i18n): i18n missing translation error message XSS' +comments: false +categories: +- i18n +advisory: + gem: i18n + cve: 2013-4492 + osvdb: 100528 + ghsa: r5hc-9xx5-97rw + url: https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998 + title: i18n missing translation error message XSS + date: 2013-12-03 + description: | + The HTML exception message raised by I18n::MissingTranslation fails + to escape the keys. + cvss_v2: 4.3 + patched_versions: + - "~> 0.5.1" + - ">= 0.6.6" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-6414.md b/advisories/_posts/2013-12-03-CVE-2013-6414.md new file mode 100644 index 00000000..2e544b88 --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-6414.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-6414 (actionpack): Denial of Service Vulnerability in Action View' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-6414 + osvdb: 100525 + ghsa: mpxf-gcw2-pw5q + url: https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg + title: Denial of Service Vulnerability in Action View + date: 2013-12-03 + description: | + There is a denial of service vulnerability in the header handling component of + Action View. + cvss_v2: 5.0 + unaffected_versions: + - "~> 2.3.0" + patched_versions: + - "~> 3.2.16" + - ">= 4.0.2" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-6415.md b/advisories/_posts/2013-12-03-CVE-2013-6415.md new file mode 100644 index 00000000..70af34f3 --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-6415.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-6415 (actionpack): XSS Vulnerability in number_to_currency' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-6415 + osvdb: 100524 + ghsa: 6h5q-96hp-9jgm + url: https://groups.google.com/forum/#!topic/ruby-security-ann/9WiRn2nhfq0 + title: XSS Vulnerability in number_to_currency + date: 2013-12-03 + description: | + There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile. + The number_to_currency helper allows users to nicely format a numeric value. One + of the parameters to the helper (unit) is not escaped correctly. Applications + which pass user controlled data as the unit parameter are vulnerable to an XSS attack. + cvss_v2: 4.3 + patched_versions: + - "~> 3.2.16" + - ">= 4.0.2" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-6416.md b/advisories/_posts/2013-12-03-CVE-2013-6416.md new file mode 100644 index 00000000..500dbc00 --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-6416.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2013-6416 (actionpack): XSS Vulnerability in simple_format helper' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-6416 + osvdb: 100526 + ghsa: w37c-q653-qg95 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM + title: XSS Vulnerability in simple_format helper + date: 2013-12-03 + description: | + There is a vulnerability in the simple_format helper in Ruby on Rails. + The simple_format helper converts user supplied text into html text + which is intended to be safe for display. A change made to the + implementation of this helper means that any user provided HTML + attributes will not be escaped correctly. As a result of this error, + applications which pass user-controlled data to be included as html + attributes will be vulnerable to an XSS attack. + cvss_v2: 4.3 + unaffected_versions: + - "~> 2.3.0" + - "~> 3.1.0" + - "~> 3.2.0" + patched_versions: + - ">= 4.0.2" +--- diff --git a/advisories/_posts/2013-12-03-CVE-2013-6417.md b/advisories/_posts/2013-12-03-CVE-2013-6417.md new file mode 100644 index 00000000..1bb115ae --- /dev/null +++ b/advisories/_posts/2013-12-03-CVE-2013-6417.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2013-6417 (actionpack): Incomplete fix to CVE-2013-0155 (Unsafe Query + Generation Risk)' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2013-6417 + osvdb: 100527 + ghsa: wpw7-wxjm-cw8r + url: https://groups.google.com/forum/#!topic/ruby-security-ann/niK4drpSHT4 + title: Incomplete fix to CVE-2013-0155 (Unsafe Query Generation Risk) + date: 2013-12-03 + description: | + The prior fix to CVE-2013-0155 was incomplete and the use of common + 3rd party libraries can accidentally circumvent the protection. Due + to the way that Rack::Request and Rails::Request interact, it is + possible for a 3rd party or custom rack middleware to parse the + parameters insecurely and store them in the same key that Rails uses + for its own parameters. In the event that happens the application + will receive unsafe parameters and could be vulnerable to the earlier + vulnerability. + cvss_v2: 6.4 + patched_versions: + - "~> 3.2.16" + - ">= 4.0.2" +--- diff --git a/advisories/_posts/2013-12-12-CVE-2013-7086.md b/advisories/_posts/2013-12-12-CVE-2013-7086.md new file mode 100644 index 00000000..ed73180b --- /dev/null +++ b/advisories/_posts/2013-12-12-CVE-2013-7086.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2013-7086 (webbynode): Webbynode Gem for Ruby notify.rb growlnotify Message + Handling Arbitrary Command Execution' +comments: false +categories: +- webbynode +advisory: + gem: webbynode + cve: 2013-7086 + osvdb: 100920 + ghsa: p65m-qr5x-rrqq + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7086 + title: Webbynode Gem for Ruby notify.rb growlnotify Message Handling Arbitrary Command + Execution + date: 2013-12-12 + description: | + Webbynode Gem for Ruby contains a flaw in notify.rb that is triggered + when handling a specially crafted growlnotify message. This may allow a + context-dependent attacker to execute arbitrary commands. + cvss_v2: 7.5 +--- diff --git a/advisories/_posts/2013-12-14-CVE-2013-6460.md b/advisories/_posts/2013-12-14-CVE-2013-6460.md new file mode 100644 index 00000000..81086b04 --- /dev/null +++ b/advisories/_posts/2013-12-14-CVE-2013-6460.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2013-6460 (nokogiri): CVE-2013-6460 rubygem-nokogiri: DoS while parsing + XML documents' +comments: false +categories: +- nokogiri +- jruby +advisory: + gem: nokogiri + platform: jruby + cve: 2013-6460 + osvdb: 101179 + ghsa: 62qp-3fxm-9wxf + url: https://nvd.nist.gov/vuln/detail/CVE-2013-6460 + title: 'CVE-2013-6460 rubygem-nokogiri: DoS while parsing XML documents' + date: 2013-12-14 + description: | + Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing + XML documents + cvss_v2: 4.3 + cvss_v3: 6.5 + patched_versions: + - "~> 1.5.11" + - ">= 1.6.1" +--- diff --git a/advisories/_posts/2013-12-14-CVE-2013-6461.md b/advisories/_posts/2013-12-14-CVE-2013-6461.md new file mode 100644 index 00000000..07f32e30 --- /dev/null +++ b/advisories/_posts/2013-12-14-CVE-2013-6461.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2013-6461 (nokogiri): CVE-2013-6461 rubygem-nokogiri: DoS while parsing + XML entities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2013-6461 + osvdb: 101458 + ghsa: jmhh-w7xp-wg39 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-6461 + title: 'CVE-2013-6461 rubygem-nokogiri: DoS while parsing XML entities' + date: 2013-12-14 + description: | + Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing + to apply limits + cvss_v3: 6.5 + patched_versions: + - "~> 1.5.11" + - ">= 1.6.1" +--- diff --git a/advisories/_posts/2013-12-14-CVE-2013-7111.md b/advisories/_posts/2013-12-14-CVE-2013-7111.md new file mode 100644 index 00000000..924817b4 --- /dev/null +++ b/advisories/_posts/2013-12-14-CVE-2013-7111.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2013-7111 (bio-basespace-sdk): Bio Basespace SDK Gem for Ruby Command + Line API Key Disclosure' +comments: false +categories: +- bio-basespace-sdk +advisory: + gem: bio-basespace-sdk + cve: 2013-7111 + osvdb: 101031 + ghsa: xwr3-fmgj-mmfr + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7111 + title: Bio Basespace SDK Gem for Ruby Command Line API Key Disclosure + date: 2013-12-14 + description: | + Bio Basespace SDK Gem for Ruby contains a flaw that is due to the API + client code passing the API_KEY to a curl command. This may allow a local attacker + to gain access to API key information by monitoring the process table. +--- diff --git a/advisories/_posts/2013-12-24-CVE-2013-7222.md b/advisories/_posts/2013-12-24-CVE-2013-7222.md new file mode 100644 index 00000000..fd1116f5 --- /dev/null +++ b/advisories/_posts/2013-12-24-CVE-2013-7222.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-7222 (fat_free_crm): Fat Free CRM Gem for Ruby lack of support for + cycling the Rails session secret' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2013-7222 + osvdb: 101445 + ghsa: g897-cgfc-7q8v + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7222 + title: Fat Free CRM Gem for Ruby lack of support for cycling the Rails session secret + date: 2013-12-24 + description: | + Fat Free CRM contains a flaw that is due to the application defining a static + security session token in config/initialiers/secret_token.rb. If a remote + attacker has explicit knowledge of this token, they can potentially execute + arbitrary code. + cvss_v2: 5.0 + patched_versions: + - ">= 0.13.0" + - "~> 0.12.1" +--- diff --git a/advisories/_posts/2013-12-24-CVE-2013-7223.md b/advisories/_posts/2013-12-24-CVE-2013-7223.md new file mode 100644 index 00000000..b7ecdb8a --- /dev/null +++ b/advisories/_posts/2013-12-24-CVE-2013-7223.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-7223 (fat_free_crm): Fat Free CRM Gem for Ruby contains multiple + cross-site request forgery (CSRF) vulnerabilities' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2013-7223 + osvdb: 101446 + ghsa: mcvq-7xjq-46x6 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7223 + title: Fat Free CRM Gem for Ruby contains multiple cross-site request forgery (CSRF) + vulnerabilities + date: 2013-12-24 + description: | + Fat Free CRM contains a flaw as the application is missing the protect_from_forgery + statement, therefore HTTP requests to app/controllers/application_controller.rb + do not require multiple steps, explicit confirmation, or a unique token when + performing certain sensitive actions. By tricking a user into following a specially + crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery + (CSRF / XSRF) attack causing the victim to perform unspecified actions. + cvss_v2: 6.8 + patched_versions: + - ">= 0.13.0" + - "~> 0.12.1" +--- diff --git a/advisories/_posts/2013-12-24-CVE-2013-7224.md b/advisories/_posts/2013-12-24-CVE-2013-7224.md new file mode 100644 index 00000000..89ae76b6 --- /dev/null +++ b/advisories/_posts/2013-12-24-CVE-2013-7224.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2013-7224 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers + to obtain sensitive informations' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2013-7224 + osvdb: 101447 + ghsa: 4xq9-vw89-p5cx + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7224 + title: Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations + date: 2013-12-24 + description: | + Fat Free CRM contains a flaw in user controllers that is triggered as JSON + requests are rendered with a full JSON object. This may allow a remote + attacker to gain access to potentially sensitive information e.g. other + users password hashes. + cvss_v2: 5.0 + patched_versions: + - ">= 0.13.0" + - "~> 0.12.1" +--- diff --git a/advisories/_posts/2013-12-24-CVE-2013-7225.md b/advisories/_posts/2013-12-24-CVE-2013-7225.md new file mode 100644 index 00000000..bf963590 --- /dev/null +++ b/advisories/_posts/2013-12-24-CVE-2013-7225.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-7225 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers + to inject or manipulate SQL queries' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2013-7225 + osvdb: 101448 + ghsa: 9ggp-5rf4-x7q9 + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7225 + title: Fat Free CRM Gem for Ruby allows remote attackers to inject or manipulate + SQL queries + date: 2013-12-24 + description: | + Fat Free CRM contains a flaw that may allow carrying out an SQL injection + attack. The issue is due to the app/controllers/home_controller.rb script + not properly sanitizing user-supplied input to the 'state' parameter or + input passed via comments and emails. This may allow a remote attacker to + inject or manipulate SQL queries in the back-end database, allowing for + the manipulation or disclosure of arbitrary data. + cvss_v2: 6.5 + patched_versions: + - ">= 0.13.0" + - "~> 0.12.1" +--- diff --git a/advisories/_posts/2013-12-24-CVE-2013-7249.md b/advisories/_posts/2013-12-24-CVE-2013-7249.md new file mode 100644 index 00000000..d5e964e6 --- /dev/null +++ b/advisories/_posts/2013-12-24-CVE-2013-7249.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2013-7249 (fat_free_crm): Fat Free CRM Gem for Ruby allows remote attackers + to obtain sensitive informations' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2013-7249 + osvdb: 101700 + ghsa: f25h-3mj6-4jpg + url: https://nvd.nist.gov/vuln/detail/CVE-2013-7249 + title: Fat Free CRM Gem for Ruby allows remote attackers to obtain sensitive informations + date: 2013-12-24 + description: | + Fat Free CRM contains a flaw that is triggered when the attacker sends a + direct request for XML data. This may allow a remote attacker to gain + access to potentially sensitive information. + cvss_v2: 5.0 + patched_versions: + - ">= 0.13.0" + - "~> 0.12.1" +--- diff --git a/advisories/_posts/2013-12-26-CVE-2014-1233.md b/advisories/_posts/2013-12-26-CVE-2014-1233.md new file mode 100644 index 00000000..8e6278da --- /dev/null +++ b/advisories/_posts/2013-12-26-CVE-2014-1233.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-1233 (paratrooper-pingdom): paratrooper-pingdom Gem for Ruby /lib/paratrooper-pingdom.rb + API Login Credentials Local Disclosure' +comments: false +categories: +- paratrooper-pingdom +advisory: + gem: paratrooper-pingdom + cve: 2014-1233 + osvdb: 101847 + ghsa: fqrr-rrwg-69pv + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1233 + title: paratrooper-pingdom Gem for Ruby /lib/paratrooper-pingdom.rb API Login Credentials + Local Disclosure + date: 2013-12-26 + description: | + paratrooper-pingdom Gem for Ruby contains a flaw in + /lib/paratrooper-pingdom.rb. The issue is triggered when the script exposes + API login credentials, allowing a local attacker to gain access to the API + key, username, and password for the API login by monitoring the process tree. + cvss_v2: 2.1 +--- diff --git a/advisories/_posts/2013-12-31-OSVDB-101577.md b/advisories/_posts/2013-12-31-OSVDB-101577.md new file mode 100644 index 00000000..8e3e73b1 --- /dev/null +++ b/advisories/_posts/2013-12-31-OSVDB-101577.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-101577 (flukso4r): flukso4r Gem for Ruby /lib/flukso/R.rb Arbitrary + Command Execution' +comments: false +categories: +- flukso4r +advisory: + gem: flukso4r + osvdb: 101577 + url: https://vulners.com/seebug/SSV:61267 + title: flukso4r Gem for Ruby /lib/flukso/R.rb Arbitrary Command Execution + date: 2013-12-31 + description: | + flukso4r Gem for Ruby contains a flaw in /lib/flukso/R.rb that is due + to the application failing to properly validate user-supplied input. This may allow + a context-dependent attacker to execute arbitrary commands. + notes: No patched version + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-FLUKSO4R-20136 + - https://vulners.com/seebug/SSV:61267 + - http://osvdb.org/show/osvdb/101577 +--- diff --git a/advisories/_posts/2014-01-08-CVE-2014-1234.md b/advisories/_posts/2014-01-08-CVE-2014-1234.md new file mode 100644 index 00000000..a08d1314 --- /dev/null +++ b/advisories/_posts/2014-01-08-CVE-2014-1234.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2014-1234 (paratrooper-newrelic): Paratrooper-newrelic Gem for Ruby Process + Listing API Key Local Disclosure' +comments: false +categories: +- paratrooper-newrelic +advisory: + gem: paratrooper-newrelic + cve: 2014-1234 + osvdb: 101839 + ghsa: 959j-5g9v-3fpq + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1234 + title: Paratrooper-newrelic Gem for Ruby Process Listing API Key Local Disclosure + date: 2014-01-08 + description: | + Paratrooper-newrelic Gem for Ruby contains a flaw in + /lib/paratrooper-newrelic.rb. The issue is triggered when the script exposes + the API key, allowing a local attacker to gain access to it by monitoring the + process tree. + cvss_v2: 2.1 +--- diff --git a/advisories/_posts/2014-01-14-CVE-2014-0013.md b/advisories/_posts/2014-01-14-CVE-2014-0013.md new file mode 100644 index 00000000..a7a727c0 --- /dev/null +++ b/advisories/_posts/2014-01-14-CVE-2014-0013.md @@ -0,0 +1,42 @@ +--- +layout: advisory +title: 'CVE-2014-0013 (ember-source): Ember.js Potential XSS Exploit With User-Supplied + Data When Binding Primitive Values' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2014-0013 + ghsa: 8xm3-gm7c-5fjx + url: https://groups.google.com/forum/#!topic/ember-security/2kpXXCxISS4 + title: Ember.js Potential XSS Exploit With User-Supplied Data When Binding Primitive + Values + date: 2014-01-14 + description: | + In general, Ember.js escapes or strips any user-supplied content before + inserting it in strings that will be sent to innerHTML. However, we have + identified a vulnerability that could lead to unescaped content being inserted + into the innerHTML string without being sanitized. + + When a primitive value is used as the Handlebars context, that value is not + properly escaped. An example of this would be using the `{{each}}` helper to + iterate over an array of user-supplied strings and using `{{this}}` inside the + block to display each string. + + In applications that contain templates whose context is a primitive value and + use the `{{this}}` keyword to display that value, a specially-crafted payload + could execute arbitrary JavaScript in the context of the current domain + ("XSS"). + + This vulnerability affects applications that contain templates whose context is + set to a user-supplied primitive value (such as a string or number) and also + contain the `{{this}}` special Handlebars variable to display the value. + cvss_v3: 5.4 + patched_versions: + - "~> 1.0.1" + - "~> 1.1.3" + - "~> 1.2.1" + - "~> 1.3.1" + - ">= 1.4.0.beta.2" +--- diff --git a/advisories/_posts/2014-01-14-CVE-2014-0014.md b/advisories/_posts/2014-01-14-CVE-2014-0014.md new file mode 100644 index 00000000..ea829af0 --- /dev/null +++ b/advisories/_posts/2014-01-14-CVE-2014-0014.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2014-0014 (ember-source): Ember.js Potential XSS Exploit With User-Supplied + Data When Using {{group}} Helper' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2014-0014 + ghsa: rcx6-7jp6-pqf2 + url: https://groups.google.com/forum/#!topic/ember-security/PSE4RzTi6l4 + title: Ember.js Potential XSS Exploit With User-Supplied Data When Using {{group}} + Helper + date: 2014-01-14 + description: | + In general, Ember.js escapes or strips any user-supplied content before + inserting it in strings that will be sent to innerHTML. However, we have + identified a vulnerability that could lead to unescaped content being inserted + into the innerHTML string without being sanitized. + + When using the `{{group}}` helper, user supplied content in the template was not + being sanitized. Though the vulnerability exists in Ember.js proper, it is only + exposed via the use of an experimental plugin. + + In applications that use the `{{group}}` helper, a specially-crafted payload + could execute arbitrary JavaScript in the context of the current domain + ("XSS"). + + This vulnerability only affects applications that use the `{{group}}` helper + to display user-provided content. + cvss_v3: 5.4 + patched_versions: + - "~> 1.0.1" + - "~> 1.1.3" + - "~> 1.2.1" + - "~> 1.3.1" + - ">= 1.4.0.beta.2" +--- diff --git a/advisories/_posts/2014-01-14-CVE-2014-1834.md b/advisories/_posts/2014-01-14-CVE-2014-1834.md new file mode 100644 index 00000000..aacf51fa --- /dev/null +++ b/advisories/_posts/2014-01-14-CVE-2014-1834.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-1834 (echor): echor Gem for Ruby backplane.rb perform_request Function + Arbitrary Command Execution' +comments: false +categories: +- echor +advisory: + gem: echor + cve: 2014-1834 + osvdb: 102129 + ghsa: 8936-cgj4-phr2 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1834 + title: echor Gem for Ruby backplane.rb perform_request Function Arbitrary Command + Execution + date: 2014-01-14 + description: | + Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request + function that is triggered when a semi-colon (;) is injected into a username + or password. This may allow a context-dependent attacker to inject arbitrary + commands if the gem is used in a rails application. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-01-14-CVE-2014-1835.md b/advisories/_posts/2014-01-14-CVE-2014-1835.md new file mode 100644 index 00000000..11b31718 --- /dev/null +++ b/advisories/_posts/2014-01-14-CVE-2014-1835.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2014-1835 (echor): echor Gem for Ruby Process Listing Local Plaintext + Credential Disclosure' +comments: false +categories: +- echor +advisory: + gem: echor + cve: 2014-1835 + osvdb: 102130 + ghsa: j4gx-p3x5-m987 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1835 + title: echor Gem for Ruby Process Listing Local Plaintext Credential Disclosure + date: 2014-01-14 + description: | + echor Gem for Ruby contains a flaw that is due to the program exposing + credential information in the system process listing. This may allow a local + attacker to gain access to plaintext credential information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-01-28-CVE-2014-1831.md b/advisories/_posts/2014-01-28-CVE-2014-1831.md new file mode 100644 index 00000000..f97713df --- /dev/null +++ b/advisories/_posts/2014-01-28-CVE-2014-1831.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-1831 (passenger): CVE-2014-1831 CVE-2014-1832 rubygem-passenger: + insecure use of temporary files' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2014-1831 + osvdb: 102613 + ghsa: c7j7-p5jq-26ff + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1831 + title: 'CVE-2014-1831 CVE-2014-1832 rubygem-passenger: insecure use of temporary + files' + date: 2014-01-28 + description: | + Phusion Passenger before 4.0.37 allows local users to write to certain + files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* + file. + cvss_v2: 2.1 + patched_versions: + - ">= 4.0.37" +--- diff --git a/advisories/_posts/2014-01-29-CVE-2014-1832.md b/advisories/_posts/2014-01-29-CVE-2014-1832.md new file mode 100644 index 00000000..e0ed3b01 --- /dev/null +++ b/advisories/_posts/2014-01-29-CVE-2014-1832.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-1832 (passenger): CVE-2014-1831 CVE-2014-1832 rubygem-passenger: + insecure use of temporary files' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2014-1832 + osvdb: 102613 + ghsa: qw8w-2xcp-xg59 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-1832 + title: 'CVE-2014-1831 CVE-2014-1832 rubygem-passenger: insecure use of temporary + files' + date: 2014-01-29 + description: | + 'Phusion Passenger 4.0.37 allows local users to write to certain files + and directories via a symlink attack on (1) control_process.pid or a (2) generation-* + file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.' + cvss_v2: 2.1 + patched_versions: + - ">= 4.0.38" +--- diff --git a/advisories/_posts/2014-01-31-OSVDB-103151.md b/advisories/_posts/2014-01-31-OSVDB-103151.md new file mode 100644 index 00000000..75723c53 --- /dev/null +++ b/advisories/_posts/2014-01-31-OSVDB-103151.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-103151 (paperclip): Paperclip: Access Restriction Bypass' +comments: false +categories: +- paperclip +advisory: + gem: paperclip + osvdb: 103151 + url: https://security.snyk.io/vuln/SNYK-RUBY-PAPERCLIP-20144 + title: 'Paperclip: Access Restriction Bypass' + date: 2014-01-31 + description: | + Paperclip Gem for Ruby contains a flaw that is due to the application + failing to properly validate the file extension, instead only validating the Content-Type + header during file uploads. This may allow a remote attacker to bypass restrictions + on file types for uploaded files by spoofing the content-type. + patched_versions: + - ">= 4.0.0" + related: + url: + - https://thoughtbot.com/blog/prevent-spoofing-with-paperclip + - https://www.theregister.com/2014/02/09/content_type_spoofing_bug_in_ror_paperclip + - https://security.snyk.io/vuln/SNYK-RUBY-PAPERCLIP-20144 + - http://osvdb.org/show/osvdb/103151 +--- diff --git a/advisories/_posts/2014-02-07-CVE-2014-0046.md b/advisories/_posts/2014-02-07-CVE-2014-0046.md new file mode 100644 index 00000000..d4446109 --- /dev/null +++ b/advisories/_posts/2014-02-07-CVE-2014-0046.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2014-0046 (ember-source): Ember.js XSS Vulnerability With {{link-to}} + Helper in Non-block Form' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2014-0046 + ghsa: 4q53-fqhc-cr46 + url: https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ + title: Ember.js XSS Vulnerability With {{link-to}} Helper in Non-block Form + date: 2014-02-07 + description: | + In general, Ember.js escapes or strips any user-supplied content before + inserting it in strings that will be sent to innerHTML. However, a change made + to the implementation of the {{link-to}} helper means that any user-supplied + data bound to the {{link-to}} helper's title attribute will not be escaped + correctly. + + In applications that use the {{link-to}} helper in non-block form and bind + the title attribute to user-supplied content, a specially-crafted payload + could execute arbitrary JavaScript in the context of the current domain + ("XSS"). + + All users running an affected release and binding user-supplied data to the + {{link-to}} helper's title attribute should either upgrade or use one of the + workarounds immediately. + unaffected_versions: + - "< 1.2.0" + patched_versions: + - "~> 1.2.2" + - ">= 1.3.2" +--- diff --git a/advisories/_posts/2014-02-13-CVE-2014-0083.md b/advisories/_posts/2014-02-13-CVE-2014-0083.md new file mode 100644 index 00000000..efecb5e9 --- /dev/null +++ b/advisories/_posts/2014-02-13-CVE-2014-0083.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-0083 (net-ldap): CVE-2014-0083 rubygem-net-ldap: SSHA passwords generated + by the net-ldap Ruby gem use a weak salt' +comments: false +categories: +- net-ldap +advisory: + gem: net-ldap + cve: 2014-0083 + osvdb: 106108 + ghsa: qwgm-mxm4-3q2c + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0083 + title: 'CVE-2014-0083 rubygem-net-ldap: SSHA passwords generated by the net-ldap + Ruby gem use a weak salt' + date: 2014-02-13 + description: | + The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA + passwords. + cvss_v2: 1.9 + cvss_v3: 5.5 + patched_versions: + - ">= 0.6.0" +--- diff --git a/advisories/_posts/2014-02-18-CVE-2014-0080.md b/advisories/_posts/2014-02-18-CVE-2014-0080.md new file mode 100644 index 00000000..e4cca673 --- /dev/null +++ b/advisories/_posts/2014-02-18-CVE-2014-0080.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2014-0080 (activerecord): CVE-2014-0080 rubygem-activerecord: PostgreSQL + array data injection vulnerability' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2014-0080 + osvdb: 103438 + ghsa: hqf9-rc9j-5fmj + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0080 + title: 'CVE-2014-0080 rubygem-activerecord: PostgreSQL array data injection vulnerability' + date: 2014-02-18 + description: | + SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/cast.rb + in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL + is used, allows remote attackers to execute "add data" SQL commands via vectors + involving \ (backslash) characters that are not properly handled in operations on + array columns. + unaffected_versions: + - "< 3.2.0" + - "~> 3.2.0" + patched_versions: + - "~> 4.0.3" + - ">= 4.1.0.beta2" +--- diff --git a/advisories/_posts/2014-02-18-CVE-2014-0081.md b/advisories/_posts/2014-02-18-CVE-2014-0081.md new file mode 100644 index 00000000..8f111831 --- /dev/null +++ b/advisories/_posts/2014-02-18-CVE-2014-0081.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2014-0081 (actionpack): CVE-2014-0081 rubygem-actionpack: number_to_currency, + number_to_percentage and number_to_human XSS vulnerability' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2014-0081 + osvdb: 103439 + ghsa: m46p-ggm5-5j83 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0081 + title: 'CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage + and number_to_human XSS vulnerability' + date: 2014-02-18 + description: | + Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb + in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 + allow remote attackers to inject arbitrary web script or HTML via the (1) format, + (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, + or (c) number_to_human helper. + cvss_v2: 4.3 + patched_versions: + - "~> 3.2.17" + - "~> 4.0.3" + - ">= 4.1.0.beta2" +--- diff --git a/advisories/_posts/2014-02-18-CVE-2014-0082.md b/advisories/_posts/2014-02-18-CVE-2014-0082.md new file mode 100644 index 00000000..9ea3e494 --- /dev/null +++ b/advisories/_posts/2014-02-18-CVE-2014-0082.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2014-0082 (actionpack): CVE-2014-0082 rubygem-actionpack: Action View + string handling denial of service' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2014-0082 + osvdb: 103440 + ghsa: 7cgp-c3g7-qvrw + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0082 + title: 'CVE-2014-0082 rubygem-actionpack: Action View string handling denial of + service' + date: 2014-02-18 + description: | + actionpack/lib/action_view/template/text.rb in Action View in Ruby on + Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the + :text option to the render method, which allows remote attackers to cause a denial + of service (memory consumption) by including these strings in headers. + cvss_v2: 5.0 + unaffected_versions: + - ">= 4.0.0" + patched_versions: + - ">= 3.2.17" +--- diff --git a/advisories/_posts/2014-03-05-CVE-2014-0036.md b/advisories/_posts/2014-03-05-CVE-2014-0036.md new file mode 100644 index 00000000..d836d7bb --- /dev/null +++ b/advisories/_posts/2014-03-05-CVE-2014-0036.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2014-0036 (rbovirt): CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client' +comments: false +categories: +- rbovirt +advisory: + gem: rbovirt + cve: 2014-0036 + osvdb: 104080 + ghsa: ww79-8xwv-932x + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0036 + title: 'CVE-2014-0036 rubygem-rbovirt: unsafe use of rest-client' + date: 2014-03-05 + description: | + The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with + SSL verification disabled, which allows remote attackers to conduct man-in-the-middle + attacks via unspecified vectors. + cvss_v2: 6.8 + patched_versions: + - ">= 0.0.24" +--- diff --git a/advisories/_posts/2014-03-10-CVE-2014-2322.md b/advisories/_posts/2014-03-10-CVE-2014-2322.md new file mode 100644 index 00000000..28145d6f --- /dev/null +++ b/advisories/_posts/2014-03-10-CVE-2014-2322.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2014-2322 (Arabic-Prawn): Arabic Prawn Gem for Ruby lib/string_utf_support.rb + User Input Handling Remote Command Injection' +comments: false +categories: +- Arabic-Prawn +advisory: + gem: Arabic-Prawn + cve: 2014-2322 + osvdb: 104365 + ghsa: hgmw-x865-hf9x + url: http://www.openwall.com/lists/oss-security/2014/03/10/8 + title: Arabic Prawn Gem for Ruby lib/string_utf_support.rb User Input Handling Remote + Command Injection + date: 2014-03-10 + description: | + Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb + file. The issue is due to the program failing to sanitize user input. This may + allow a remote attacker to inject arbitrary commands. + + "lib/string_utf_support.rb" in the Arabic Prawn 0.0.1 gem for Ruby + allows remote attackers to execute arbitrary commands via shell + metacharacters in the (1) downloaded_file or (2) url variable. + cvss_v2: 7.5 + notes: Never patched + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-2322 + - http://www.openwall.com/lists/oss-security/2014/03/10/8 + - http://www.openwall.com/lists/oss-security/2014/03/12/6 + - https://web.archive.org/web/20160306235714/http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html + - http://www.vapid.dhs.org/advisories/arabic-ruby-gem.html + - http://www.vapidlabs.com/advisory.php?v=16 + - https://github.com/advisories/GHSA-hgmw-x865-hf9x + - https://rubygems.org/gems/Arabic-Prawn +--- diff --git a/advisories/_posts/2014-03-13-CVE-2014-0135.md b/advisories/_posts/2014-03-13-CVE-2014-0135.md new file mode 100644 index 00000000..35c2facf --- /dev/null +++ b/advisories/_posts/2014-03-13-CVE-2014-0135.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2014-0135 (kafo): CVE-2014-0135 rubygem-kafo: temporary file creation + vulnerability when creating /tmp/default_values.yaml' +comments: false +categories: +- kafo +advisory: + gem: kafo + cve: 2014-0135 + osvdb: 106826 + ghsa: hxvp-655x-xxqv + url: https://nvd.nist.gov/vuln/detail/CVE-2014-0135 + title: 'CVE-2014-0135 rubygem-kafo: temporary file creation vulnerability when creating + /tmp/default_values.yaml' + date: 2014-03-13 + description: | + Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable + permissions for default_values.yaml, which allows local users to obtain passwords + and other sensitive information by reading the file. + cvss_v2: 1.9 + patched_versions: + - "~> 0.3.17" + - ">= 0.5.2" + related: + url: + - https://github.com/rubysec/ruby-advisory-db/issues/238 + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/world-readable-permissions-as-default/ruby/sid-740/summary +--- diff --git a/advisories/_posts/2014-03-25-CVE-2014-4920.md b/advisories/_posts/2014-03-25-CVE-2014-4920.md new file mode 100644 index 00000000..ea2b278b --- /dev/null +++ b/advisories/_posts/2014-03-25-CVE-2014-4920.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2014-4920 (twitter-bootstrap-rails): Reflective XSS Vulnerability in twitter-bootstrap-rails' +comments: false +categories: +- twitter-bootstrap-rails +- rails +advisory: + gem: twitter-bootstrap-rails + framework: rails + cve: 2014-4920 + osvdb: 109206 + ghsa: vpqv-mqvc-pcx2 + url: https://nvisium.com/blog/2014/03/28/reflected-xss-vulnerability-in-twitter + title: Reflective XSS Vulnerability in twitter-bootstrap-rails + date: 2014-03-25 + description: | + The twitter-bootstrap-rails Gem for Rails contains a flaw that enables a + reflected cross-site scripting (XSS) attack. This flaw exists because the + bootstrap_flash helper method does not validate input when handling flash + messages before returning it to users. This may allow a context-dependent + attacker to create a specially crafted request that would execute arbitrary + script code in a user's browser session within the trust relationship between + their browser and the server. + patched_versions: + - ">= 3.2.0" +--- diff --git a/advisories/_posts/2014-03-28-CVE-2014-0156.md b/advisories/_posts/2014-03-28-CVE-2014-0156.md new file mode 100644 index 00000000..06518df3 --- /dev/null +++ b/advisories/_posts/2014-03-28-CVE-2014-0156.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-0156 (awesome_spawn): OS command injection flaw in awesome_spawn' +comments: false +categories: +- awesome_spawn +advisory: + gem: awesome_spawn + cve: 2014-0156 + ghsa: qpqw-mc85-qvm9 + url: https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff + title: OS command injection flaw in awesome_spawn + date: 2014-03-28 + description: | + Awesome spawn contains OS command injection vulnerability, which allows + execution of additional commands passed to Awesome spawn as arguments, e.g. AwesomeSpawn.run('ls',:params + => {'-l' => ";touch haxored"}). If untrusted input was included in command arguments, + attacker could use this flaw to execute arbitrary command. + cvss_v2: 6.8 + cvss_v3: 9.8 + patched_versions: + - "~> 1.2.0" + - ">= 1.3.0" +--- diff --git a/advisories/_posts/2014-04-16-CVE-2014-2888.md b/advisories/_posts/2014-04-16-CVE-2014-2888.md new file mode 100644 index 00000000..d77100c2 --- /dev/null +++ b/advisories/_posts/2014-04-16-CVE-2014-2888.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-2888 (sfpagent): sfpagent Gem for Ruby JSON[body] Module Name Remote + Command Execution' +comments: false +categories: +- sfpagent +advisory: + gem: sfpagent + cve: 2014-2888 + osvdb: 105971 + ghsa: vm28-mrm7-fpjq + url: https://nvd.nist.gov/vuln/detail/CVE-2014-2888 + title: sfpagent Gem for Ruby JSON[body] Module Name Remote Command Execution + date: 2014-04-16 + description: | + sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] + input is not properly sanitized when handling module names with shell + metacharacters. This may allow a context-dependent attacker to execute + arbitrary commands. + cvss_v2: 7.5 + patched_versions: + - ">= 0.4.15" +--- diff --git a/advisories/_posts/2014-04-24-OSVDB-106279.md b/advisories/_posts/2014-04-24-OSVDB-106279.md new file mode 100644 index 00000000..a399de58 --- /dev/null +++ b/advisories/_posts/2014-04-24-OSVDB-106279.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-106279 (jruby-sandbox): jruby-sandbox Java Class Importation Sandbox + Bypass' +comments: false +categories: +- jruby-sandbox +- jruby +advisory: + gem: jruby-sandbox + platform: jruby + osvdb: 106279 + url: https://security.snyk.io/vuln/SNYK-RUBY-JRUBYSANDBOX-20156 + title: jruby-sandbox Java Class Importation Sandbox Bypass + date: 2014-04-24 + description: | + jruby-sandbox contains a flaw that is triggered when importing Java Classes. + This may allow a remote attacker to bypass the sandbox for code execution. + patched_versions: + - ">= 0.2.3" + related: + url: + - https://www.exploit-db.com/exploits/33028 + - https://security.snyk.io/vuln/SNYK-RUBY-JRUBYSANDBOX-20156 +--- diff --git a/advisories/_posts/2014-04-30-OSVDB-118481.md b/advisories/_posts/2014-04-30-OSVDB-118481.md new file mode 100644 index 00000000..c8350cec --- /dev/null +++ b/advisories/_posts/2014-04-30-OSVDB-118481.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'OSVDB-118481 (nokogiri): Nokogiri Gem for JRuby XML Document Root Element + Handling Memory Consumption Remote DoS' +comments: false +categories: +- nokogiri +- jruby +advisory: + gem: nokogiri + platform: jruby + osvdb: 118481 + url: https://github.com/sparklemotion/nokogiri/pull/1087 + title: Nokogiri Gem for JRuby XML Document Root Element Handling Memory Consumption + Remote DoS + date: 2014-04-30 + description: | + Nokogiri Gem for JRuby contains a flaw that is triggered when + handling a root element in an XML document. This may allow a + remote attacker to cause a consumption of memory resources. + patched_versions: + - "~> 1.6.2.2" + - ">= 1.6.3" + related: + cve: + - 2013-6461 + url: + - https://github.com/sparklemotion/nokogiri/pull/1087 + - https://github.com/sparklemotion/nokogiri/pull/1087/commits/8293bf6fddecb68b688cf025859afde7609f7bff + - https://github.com/sparklemotion/nokogiri/commit/a098ddfc9990ea79dbc191407d3e83611e5ff1e6 +--- diff --git a/advisories/_posts/2014-05-06-CVE-2014-0130.md b/advisories/_posts/2014-05-06-CVE-2014-0130.md new file mode 100644 index 00000000..0ef2ab43 --- /dev/null +++ b/advisories/_posts/2014-05-06-CVE-2014-0130.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2014-0130 (actionpack): Directory Traversal Vulnerability With Certain + Route Configurations' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2014-0130 + ghsa: 6x85-j5j2-27jx + url: https://groups.google.com/forum/#!topic/rubyonrails-security/NkKc7vTW70o + title: Directory Traversal Vulnerability With Certain Route Configurations + date: 2014-05-06 + description: | + There is a vulnerability in the 'implicit render' + functionality in Ruby on Rails.The implicit render functionality + allows controllers to render a template, even if there is no + explicit action with the corresponding name. This module does not + perform adequate input sanitization which could allow an attacker to + use a specially crafted request to retrieve arbitrary files from the + rails application server. + cvss_v2: 4.3 + patched_versions: + - "~> 3.2.18" + - "~> 4.0.5" + - ">= 4.1.1" +--- diff --git a/advisories/_posts/2014-06-07-OSVDB-107783.md b/advisories/_posts/2014-06-07-OSVDB-107783.md new file mode 100644 index 00000000..472d1327 --- /dev/null +++ b/advisories/_posts/2014-06-07-OSVDB-107783.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-107783 (screen_capture): Screen Capture Gem for Ruby screen_capture.rb + URL Handling Arbitrary Command Execution' +comments: false +categories: +- screen_capture +advisory: + gem: screen_capture + osvdb: 107783 + url: https://github.com/jamster/screen_capture/blob/master/lib/screen_capture.rb + title: Screen Capture Gem for Ruby screen_capture.rb URL Handling Arbitrary Command + Execution + date: 2014-06-07 + description: | + Screen Capture Gem for Ruby contains a flaw in screen_capture.rb that + is triggered when handling input passed via the URL. This may allow + a context-dependent attacker to execute arbitrary commands. + notes: Never patched + related: + url: + - https://github.com/jamster/screen_capture/blob/master/lib/screen_capture.rb + - http://osvdb.org/show/osvdb/107783 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-10075.md b/advisories/_posts/2014-06-30-CVE-2014-10075.md new file mode 100644 index 00000000..081a3a57 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-10075.md @@ -0,0 +1,44 @@ +--- +layout: advisory +title: 'CVE-2014-10075 (karo): karo Gem for Ruby db.rb Metacharacter Handling Remote + Command Execution' +comments: false +categories: +- karo +- rubygems +- rubygems +- rubygems +advisory: + gem: karo + library: rubygems + framework: rubygems + platform: rubygems + cve: 2014-10075 + osvdb: 108573 + ghsa: qfwq-chf4-jvwg + url: https://nvd.nist.gov/vuln/detail/CVE-2014-10075 + title: karo Gem for Ruby db.rb Metacharacter Handling Remote Command Execution + date: 2014-06-30 + description: | + The karo gem 2.3.8 for Ruby allows Remote command injection via + the host field. + + karo Gem for Ruby contains a flaw in db.rb that is triggered when handling + metacharacters. This may allow a remote attacker to execute arbitrary + commands. + + * CWE-77 - Improper Neutralization of Special Elements used + in a Command ('Command Injection') + + * Severity: CRITICAL - CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss_v3: 9.8 + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-10075 + - http://www.vapid.dhs.org/advisories/karo-2.3.8.html + - http://www.vapidlabs.com/advisory.php?v=63 + - http://osvdb.org/show/osvdb/108573 + - https://github.com/advisories/GHSA-qf67-vmxx-gp4jGHSA-qfwq-chf4-jvwg.json + - https://github.com/rahult/karo + - https://github.com/rahult/karo/blob/master/CHANGELOG.md +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4991.md b/advisories/_posts/2014-06-30-CVE-2014-4991.md new file mode 100644 index 00000000..4c296b66 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4991.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-4991 (codders-dataset): codders-dataset Gem for Ruby lib/dataset/database/mysql.rb + and lib/dataset/database/postgresql.rb Process Table Local Plaintext Credential + Disclosure' +comments: false +categories: +- codders-dataset +advisory: + gem: codders-dataset + cve: 2014-4991 + osvdb: 108582 + ghsa: w9vv-fvw8-j6q3 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4991 + title: codders-dataset Gem for Ruby lib/dataset/database/mysql.rb and lib/dataset/database/postgresql.rb + Process Table Local Plaintext Credential Disclosure + date: 2014-06-30 + description: | + "(1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb + in the codders-dataset gem 1.3.2.1 for Ruby place credentials on the mysqldump command + line, which allows local users to obtain sensitive information by listing the process." + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4992.md b/advisories/_posts/2014-06-30-CVE-2014-4992.md new file mode 100644 index 00000000..cdef48fa --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4992.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2014-4992 (cap-strap): cap-strap Gem for Ruby Process Table Local Plaintext + Credential Disclosure' +comments: false +categories: +- cap-strap +advisory: + gem: cap-strap + cve: 2014-4992 + osvdb: 108574 + ghsa: pcm6-g2qp-9gw8 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4992 + title: cap-strap Gem for Ruby Process Table Local Plaintext Credential Disclosure + date: 2014-06-30 + description: | + cap-strap Gem for Ruby contains a flaw that is due to the application + exposing credential information in plaintext in the process table listing. This + may allow a local attacker to gain access to credential information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4993.md b/advisories/_posts/2014-06-30-CVE-2014-4993.md new file mode 100644 index 00000000..bfe595e6 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4993.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-4993 (backup_checksum): backup_checksum Gem for Ruby /lib/backup/cli/utility.rb + Process List Local Plaintext Password Disclosure' +comments: false +categories: +- backup_checksum +advisory: + gem: backup_checksum + cve: 2014-4993 + osvdb: 108569 + ghsa: wr5j-q359-6vr2 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4993 + title: backup_checksum Gem for Ruby /lib/backup/cli/utility.rb Process List Local + Plaintext Password Disclosure + date: 2014-06-30 + description: | + backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb + that is triggered as the program displays password information in plaintext + in the process list. This may allow a local attacker to gain access to + password information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4994.md b/advisories/_posts/2014-06-30-CVE-2014-4994.md new file mode 100644 index 00000000..c56f29aa --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4994.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2014-4994 (gyazo): gyazo Gem for Ruby client.rb Metacharacter Handling + Remote Command Execution' +comments: false +categories: +- gyazo +advisory: + gem: gyazo + cve: 2014-4994 + osvdb: 108563 + ghsa: 6x45-86q6-rcmr + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4994 + title: gyazo Gem for Ruby client.rb Metacharacter Handling Remote Command Execution + date: 2014-06-30 + description: | + gyazo Gem for Ruby contains a flaw in client.rb that is triggered when + handling metacharacters. This may allow a remote attacker to execute arbitrary commands. + cvss_v3: 5.5 + patched_versions: + - ">= 2.0.0" +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4995.md b/advisories/_posts/2014-06-30-CVE-2014-4995.md new file mode 100644 index 00000000..b3a71451 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4995.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-4995 (VladTheEnterprising): VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} + Symlink Multiple Impact' +comments: false +categories: +- VladTheEnterprising +advisory: + gem: VladTheEnterprising + cve: 2014-4995 + osvdb: 108728 + ghsa: 86cf-g34f-7462 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4995 + title: VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} Symlink Multiple + Impact + date: 2014-06-30 + description: | + VladTheEnterprising Gem for Ruby contains a flaw as the program creates + temporary files insecurely. It is possible for a local attacker to use + a symlink attack against the /tmp/my.cnf.#{target_host} file they can + overwrite arbitrary files, gain access to the MySQL root password, + or inject arbitrary commands. + cvss_v3: 7.0 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4996.md b/advisories/_posts/2014-06-30-CVE-2014-4996.md new file mode 100644 index 00000000..26da606d --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4996.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-4996 (VladTheEnterprising): VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} + Symlink Multiple Impact' +comments: false +categories: +- VladTheEnterprising +advisory: + gem: VladTheEnterprising + cve: 2014-4996 + osvdb: 108728 + ghsa: x4vj-279x-qwf2 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4996 + title: VladTheEnterprising Gem for Ruby /tmp/my.cnf.#{target_host} Symlink Multiple + Impact + date: 2014-06-30 + description: | + VladTheEnterprising Gem for Ruby contains a flaw as the program creates + temporary files insecurely. It is possible for a local attacker to use + a symlink attack against the /tmp/my.cnf.#{target_host} file they can + overwrite arbitrary files, gain access to the MySQL root password, + or inject arbitrary commands. + cvss_v3: 5.5 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4997.md b/advisories/_posts/2014-06-30-CVE-2014-4997.md new file mode 100644 index 00000000..061fd41a --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4997.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2014-4997 (point-cli): point-cli Gem for Ruby /lib/commands/setup.rb Process + Table Local Plaintext Credential Disclosure' +comments: false +categories: +- point-cli +advisory: + gem: point-cli + cve: 2014-4997 + osvdb: 108577 + ghsa: mc8m-x6hf-cw2g + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4997 + title: point-cli Gem for Ruby /lib/commands/setup.rb Process Table Local Plaintext + Credential Disclosure + date: 2014-06-30 + description: | + point-cli Gem for Ruby contains a flaw in /lib/commands/setup.rb that + is due to the application exposing credential information in plaintext in the process + table. This may allow a local attacker to gain access to credential information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4998.md b/advisories/_posts/2014-06-30-CVE-2014-4998.md new file mode 100644 index 00000000..10ef1259 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4998.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-4998 (lean-ruport): lean-ruport Gem for Ruby /test/tc_database.rb + Process Table Local Plaintext MySQL Password Disclosure' +comments: false +categories: +- lean-ruport +advisory: + gem: lean-ruport + cve: 2014-4998 + osvdb: 108581 + ghsa: 5g7f-p7jg-v6mv + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4998 + title: lean-ruport Gem for Ruby /test/tc_database.rb Process Table Local Plaintext + MySQL Password Disclosure + date: 2014-06-30 + description: | + lean-ruport Gem for Ruby contains a flaw in /test/tc_database.rb that + is due to the application exposing MySQL password information in plaintext in the + process table. This may allow a local attacker to gain access to MySQL password + information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-4999.md b/advisories/_posts/2014-06-30-CVE-2014-4999.md new file mode 100644 index 00000000..ac217304 --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-4999.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-4999 (kajam): kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb + Process List Local Plaintext Password Disclosure' +comments: false +categories: +- kajam +advisory: + gem: kajam + cve: 2014-4999 + osvdb: 108529 + ghsa: 4ph7-5c44-pppv + url: https://nvd.nist.gov/vuln/detail/CVE-2014-4999 + title: kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb Process List + Local Plaintext Password Disclosure + date: 2014-06-30 + description: | + kajam Gem for Ruby contains a flaw in + /dataset/lib/dataset/database/postgresql.rb that is triggered as the program + exposes the MySQL or PostgreSQL password in the process list. This may allow + a local attacker to gain access to password information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-5000.md b/advisories/_posts/2014-06-30-CVE-2014-5000.md new file mode 100644 index 00000000..5533867e --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-5000.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2014-5000 (lawn-login): lawn-login Gem for Ruby /lib/lawn.rb Process Table + Local Plaintext Password Disclosure' +comments: false +categories: +- lawn-login +advisory: + gem: lawn-login + cve: 2014-5000 + osvdb: 108576 + ghsa: rhgq-vv9x-j4p5 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-5000 + title: lawn-login Gem for Ruby /lib/lawn.rb Process Table Local Plaintext Password + Disclosure + date: 2014-06-30 + description: | + lawn-login Gem for Ruby contains a flaw in /lib/lawn.rb that is due to + the application exposing password information in plaintext in the process table. + This may allow a local attacker to gain access to password information. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-5001.md b/advisories/_posts/2014-06-30-CVE-2014-5001.md new file mode 100644 index 00000000..e7ff5f8b --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-5001.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2014-5001 (kcapifony): kcapifony Gem for Ruby /lib/ksymfony1.rb Process + List Local Plaintext Password Disclosure' +comments: false +categories: +- kcapifony +advisory: + gem: kcapifony + cve: 2014-5001 + osvdb: 108571 + ghsa: 6fcq-3cm2-j3j5 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-5001 + title: kcapifony Gem for Ruby /lib/ksymfony1.rb Process List Local Plaintext Password + Disclosure + date: 2014-06-30 + description: | + kcapifony Gem for Ruby contains a flaw in /lib/ksymfony1.rb that is triggered + as the program displays password information in plaintext in the process list. This + may allow a local attacker to gain access to password information. + cvss_v2: 2.1 + cvss_v3: 7.8 + notes: Never patched + related: + url: + - http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html + - http://www.vapidlabs.com/advisory.php?v=65 +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-5002.md b/advisories/_posts/2014-06-30-CVE-2014-5002.md new file mode 100644 index 00000000..2835a57a --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-5002.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2014-5002 (lynx): lynx Gem for Ruby command/basic.rb Process Table Local + Plaintext Password Disclosure' +comments: false +categories: +- lynx +advisory: + gem: lynx + cve: 2014-5002 + osvdb: 108580 + ghsa: 94cq-7ccq-cmcm + url: https://nvd.nist.gov/vuln/detail/CVE-2014-5002 + title: lynx Gem for Ruby command/basic.rb Process Table Local Plaintext Password + Disclosure + date: 2014-06-30 + description: | + lynx Gem for Ruby contains a flaw in command/basic.rb that is due to + the application exposing password information in plaintext in the process table. + This may allow a local attacker to gain access to password information. + cvss_v3: 7.8 + patched_versions: + - ">= 1.0.0" +--- diff --git a/advisories/_posts/2014-06-30-CVE-2014-5003.md b/advisories/_posts/2014-06-30-CVE-2014-5003.md new file mode 100644 index 00000000..2177980d --- /dev/null +++ b/advisories/_posts/2014-06-30-CVE-2014-5003.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2014-5003 (ciborg): ciborg Gem for Ruby default.rb /tmp/perlbrew-installer + Local Symlink File Overwrite' +comments: false +categories: +- ciborg +advisory: + gem: ciborg + cve: 2014-5003 + osvdb: 108586 + ghsa: g982-9r8g-6qxw + url: https://nvd.nist.gov/vuln/detail/CVE-2014-5003 + title: ciborg Gem for Ruby default.rb /tmp/perlbrew-installer Local Symlink File + Overwrite + date: 2014-06-30 + description: | + ciborg Gem for Ruby contains a flaw as default.rb creates temporary files + insecurely. It is possible for a local attacker to use a symlink attack against + the /tmp/perlbrew-installer file to cause the program to unexpectedly overwrite + an arbitrary file. + cvss_v3: 5.5 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108530.md b/advisories/_posts/2014-06-30-OSVDB-108530.md new file mode 100644 index 00000000..720f0594 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108530.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-108530 (kajam): kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb + Metacharacter Handling Remote Command Execution' +comments: false +categories: +- kajam +advisory: + gem: kajam + osvdb: 108530 + url: https://security.snyk.io/vuln/SNYK-RUBY-KAJAM-20171 + title: kajam Gem for Ruby /dataset/lib/dataset/database/postgresql.rb Metacharacter + Handling Remote Command Execution + date: 2014-06-30 + description: | + kajam Gem for Ruby contains a flaw in + /dataset/lib/dataset/database/postgresql.rb that is triggered + when handling metacharacters. This may allow a remote attacker + to execute arbitrary commands. + notes: Never patched + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-KAJAM-20171 + - https://my.diffend.io/gems/kajam/1.0.3.rc2 + - http://osvdb.org/show/osvdb/108530 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108570.md b/advisories/_posts/2014-06-30-OSVDB-108570.md new file mode 100644 index 00000000..e661ba40 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108570.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-108570 (backup_checksum): backup_checksum Gem for Ruby /lib/backup/cli/utility.rb + Metacharacter Handling Remote Command Execution' +comments: false +categories: +- backup_checksum +advisory: + gem: backup_checksum + osvdb: 108570 + url: https://www.openwall.com/lists/oss-security/2014/07/07/12 + title: backup_checksum Gem for Ruby /lib/backup/cli/utility.rb Metacharacter Handling + Remote Command Execution + date: 2014-06-30 + description: | + backup_checksum Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb + that is triggered when handling metacharacters. This may allow a remote + attacker to execute arbitrary commands. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/07/12 + - https://my.diffend.io/gems/backup_checksum/3.0.23 + - https://github.com/backup/backup + - http://osvdb.org/show/osvdb/108570 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108572.md b/advisories/_posts/2014-06-30-OSVDB-108572.md new file mode 100644 index 00000000..28f231f9 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108572.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-108572 (kcapifony): kcapifony Gem for Ruby /lib/ksymfony1.rb Metacharacter + Handling Remote Command Execution' +comments: false +categories: +- kcapifony +advisory: + gem: kcapifony + osvdb: 108572 + url: https://www.mend.io/vulnerability-database/WS-2014-0019 + title: kcapifony Gem for Ruby /lib/ksymfony1.rb Metacharacter Handling Remote Command + Execution + date: 2014-06-30 + description: | + kcapifony Gem for Ruby contains a flaw in /lib/ksymfony1.rb that + is triggered when handling metacharacters. This may allow a remote + attacker to execute arbitrary commands. + notes: Never patched + related: + url: + - https://www.mend.io/vulnerability-database/WS-2014-0019 + - https://github.com/Kunstmaan/kCapifony/blob/master/lib/ksymfony1.rb + - http://www.vapid.dhs.org/advisories/kcapifony-2.1.6.html + - http://www.vapidlabs.com/advisory.php?v=65 + - http://osvdb.org/show/osvdb/108572 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108573.md b/advisories/_posts/2014-06-30-OSVDB-108573.md new file mode 100644 index 00000000..aa26d62d --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108573.md @@ -0,0 +1,18 @@ +--- +layout: advisory +title: 'OSVDB-108573 (karo): karo Gem for Ruby db.rb Metacharacter Handling Remote + Command Execution' +comments: false +categories: +- karo +advisory: + gem: karo + osvdb: 108573 + url: http://osvdb.org/show/osvdb/108573 + title: karo Gem for Ruby db.rb Metacharacter Handling Remote Command Execution + date: 2014-06-30 + description: | + karo Gem for Ruby contains a flaw in db.rb that is triggered when handling + metacharacters. This may allow a remote attacker to execute arbitrary + commands. +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108575.md b/advisories/_posts/2014-06-30-OSVDB-108575.md new file mode 100644 index 00000000..091fb562 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108575.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-108575 (cap-strap): cap-strap Gem for Ruby Hardcoded Password Crypt + Hash Salt Weakness' +comments: false +categories: +- cap-strap +advisory: + gem: cap-strap + osvdb: 108575 + url: https://www.openwall.com/lists/oss-security/2014/07/07/9 + title: cap-strap Gem for Ruby Hardcoded Password Crypt Hash Salt Weakness + date: 2014-06-30 + description: | + cap-strap Gem for Ruby contains a flaw that is due to the application + using a hardcoded default 'sa' salt for password encryption. This may + allow a local attacker to more easily decrypt passwords. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/07/9 + - https://github.com/substantial/cap-strap + - http://www.vapid.dhs.org/advisories/cap-strap-0.1.5.html + - http://www.vapidlabs.com/advisory.php?v=27 + - http://osvdb.org/show/osvdb/108575 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108579.md b/advisories/_posts/2014-06-30-OSVDB-108579.md new file mode 100644 index 00000000..a89fd571 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108579.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-108579 (lynx): lynx Gem for Ruby lib/lynx/pipe/run.rb Remote Command + Execution' +comments: false +categories: +- lynx +advisory: + gem: lynx + osvdb: 108579 + url: https://www.openwall.com/lists/oss-security/2014/07/07/23 + title: lynx Gem for Ruby lib/lynx/pipe/run.rb Remote Command Execution + date: 2014-06-30 + description: | + lynx Gem for Ruby contains a flaw in lib/lynx/pipe/run.rb that + may allow a remote attacker to execute arbitrary commands. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/07/23 + - https://security.snyk.io/vuln/SNYK-RUBY-LYNX-20160 + - https://github.com/panthomakos/lynx/blob/master/lib/lynx/pipe/run.rb + - http://osvdb.org/show/osvdb/108579 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108585.md b/advisories/_posts/2014-06-30-OSVDB-108585.md new file mode 100644 index 00000000..d9de9ee1 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108585.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-108585 (lingq): lingq Gem for Ruby client.rb Metacharacter Handling + Remote Command Execution' +comments: false +categories: +- lingq +advisory: + gem: lingq + osvdb: 108585 + url: https://www.versioneye.com/Ruby/lingq/0.3.1 + title: lingq Gem for Ruby client.rb Metacharacter Handling Remote Command Execution + date: 2014-06-30 + description: | + lingq Gem for Ruby contains a flaw in client.rb that is triggered + when handling metacharacters. This may allow a remote attacker + to execute arbitrary commands. + notes: Never patched + related: + url: + - https://www.versioneye.com/Ruby/lingq/0.3.1 + - http://www.vapid.dhs.org/advisories/lingq-0.3.1.html + - http://www.vapidlabs.com/advisory.php?v=71 + - http://osvdb.org/show/osvdb/108585 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108593.md b/advisories/_posts/2014-06-30-OSVDB-108593.md new file mode 100644 index 00000000..dfd4d873 --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108593.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'OSVDB-108593 (kompanee-recipes): kompanee-recipes Gem for Ruby /lib/kompanee-recipes/heroku.rb + Multiple Variable Handling Remote Command Execution Weakness' +comments: false +categories: +- kompanee-recipes +advisory: + gem: kompanee-recipes + osvdb: 108593 + url: https://www.openwall.com/lists/oss-security/2014/07/07/17 + title: kompanee-recipes Gem for Ruby /lib/kompanee-recipes/heroku.rb Multiple Variable + Handling Remote Command Execution Weakness + date: 2014-06-30 + description: | + kompanee-recipes Gem for Ruby contains a flaw in + /lib/kompanee-recipes/heroku.rb that is triggered when handling shell + metacharacters passed via the 'password', 'user', 'deploy_name', and + 'application' variables. This may allow a remote attacker to execute + arbitrary commands. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/07/17 + - https://seclists.org/oss-sec/2014/q3/162 + - https://www.mend.io/vulnerability-database/WS-2014-0025 + - https://security.snyk.io/vuln/SNYK-RUBY-KOMPANEERECIPES-20177 + - http://www.vapid.dhs.org/advisories/kompanee-recipes-0.1.4.html + - http://www.vapidlabs.com/advisory.php?v=67 + - http://osvdb.org/show/osvdb/108593 +--- diff --git a/advisories/_posts/2014-06-30-OSVDB-108594.md b/advisories/_posts/2014-06-30-OSVDB-108594.md new file mode 100644 index 00000000..44ec6e6a --- /dev/null +++ b/advisories/_posts/2014-06-30-OSVDB-108594.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-108594 (gnms): gnms Gem for Ruby /lib/cmd_parse.rb ip Variable Shell + Metacharacter Handling Remote Command Injection' +comments: false +categories: +- gnms +advisory: + gem: gnms + osvdb: 108594 + url: http://www.vapidlabs.com/advisories/gnms-2.1.1.html + title: gnms Gem for Ruby /lib/cmd_parse.rb ip Variable Shell Metacharacter Handling + Remote Command Injection + date: 2014-06-30 + description: | + gnms Gem for Ruby contains a flaw in /lib/cmd_parse.rb that is triggered + when handling shell metacharacters passed via the 'ip' variable. + This may allow a remote attacker to inject arbitrary commands. + notes: Never patched + related: + url: + - http://www.vapidlabs.com/advisories/gnms-2.1.1.html + - http://www.vapidlabs.com/advisory.php?v=55 + - http://osvdb.org/show/osvdb/108594 +--- diff --git a/advisories/_posts/2014-07-02-CVE-2014-3482.md b/advisories/_posts/2014-07-02-CVE-2014-3482.md new file mode 100644 index 00000000..56e696b4 --- /dev/null +++ b/advisories/_posts/2014-07-02-CVE-2014-3482.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2014-3482 (activerecord): CVE-2014-3482 rubygem-activerecord: SQL injection + vulnerability in ''bitstring'' quoting' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2014-3482 + osvdb: 108664 + ghsa: mhwp-qhpc-h3jm + url: https://nvd.nist.gov/vuln/detail/CVE-2014-3482 + title: 'CVE-2014-3482 rubygem-activerecord: SQL injection vulnerability in ''bitstring'' + quoting' + date: 2014-07-02 + description: | + SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql_adapter.rb + in the PostgreSQL adapter for Active Record in Ruby on Rails 2.x and 3.x before + 3.2.19 allows remote attackers to execute arbitrary SQL commands by leveraging improper + bitstring quoting. It was discovered that Active Record did not properly quote values + of the bitstring type attributes when using the PostgreSQL database adapter. A remote + attacker could possibly use this flaw to conduct an SQL injection attack against + applications using Active Record. + unaffected_versions: + - ">= 4.0.0" + patched_versions: + - "~> 3.2.19" +--- diff --git a/advisories/_posts/2014-07-02-CVE-2014-3483.md b/advisories/_posts/2014-07-02-CVE-2014-3483.md new file mode 100644 index 00000000..698c457d --- /dev/null +++ b/advisories/_posts/2014-07-02-CVE-2014-3483.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2014-3483 (activerecord): CVE-2014-3483 rubygem-activerecord: SQL injection + vulnerability in ''range'' quoting' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2014-3483 + osvdb: 108665 + ghsa: r8fh-hq2p-7qhq + url: https://nvd.nist.gov/vuln/detail/CVE-2014-3483 + title: 'CVE-2014-3483 rubygem-activerecord: SQL injection vulnerability in ''range'' + quoting' + date: 2014-07-02 + description: | + SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb + in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and + 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by + leveraging improper range quoting. It was discovered that Active Record did not + properly quote values of the range type attributes when using the PostgreSQL database + adapter. A remote attacker could possibly use this flaw to conduct an SQL injection + attack against applications using Active Record. + unaffected_versions: + - "< 4.0.0" + patched_versions: + - "~> 4.0.7" + - ">= 4.1.3" +--- diff --git a/advisories/_posts/2014-07-09-CVE-2014-5004.md b/advisories/_posts/2014-07-09-CVE-2014-5004.md new file mode 100644 index 00000000..15d6356b --- /dev/null +++ b/advisories/_posts/2014-07-09-CVE-2014-5004.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2014-5004 (brbackup): brbackup Gem for Ruby Process List Local Plaintext + Password Disclosure' +comments: false +categories: +- brbackup +advisory: + gem: brbackup + cve: 2014-5004 + osvdb: 108901 + ghsa: vqcm-7f7f-r539 + url: http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html + title: brbackup Gem for Ruby Process List Local Plaintext Password Disclosure + date: 2014-07-09 + description: | + brbackup Gem for Ruby contains a flaw that is due to the program exposing + password information in plaintext in the process list. This may allow a + local attacker to gain access to password information. + cvss_v2: 2.1 + cvss_v3: 7.8 + notes: Never patched + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-5004 + - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html + - http://www.vapidlabs.com/advisory.php?v=25 + - http://www.openwall.com/lists/oss-security/2014/07/10/6 + - http://www.openwall.com/lists/oss-security/2014/07/17/5 + - http://www.securityfocus.com/bid/68506 + - https://web.archive.org/web/20200229055655/https://www.securityfocus.com/bid/68506/ +--- diff --git a/advisories/_posts/2014-07-09-OSVDB-108899.md b/advisories/_posts/2014-07-09-OSVDB-108899.md new file mode 100644 index 00000000..2eb2060b --- /dev/null +++ b/advisories/_posts/2014-07-09-OSVDB-108899.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'OSVDB-108899 (brbackup): brbackup Gem for Ruby /lib/brbackup.rb name Parameter + SQL Injection' +comments: false +categories: +- brbackup +advisory: + gem: brbackup + osvdb: 108899 + url: https://www.openwall.com/lists/oss-security/2014/07/10/6 + title: brbackup Gem for Ruby /lib/brbackup.rb name Parameter SQL Injection + date: 2014-07-09 + description: | + brbackup Gem for Ruby contains a flaw that may allow carrying out an SQL + injection attack. The issue is due to the /lib/brbackup.rb script not + properly sanitizing user-supplied input to the 'name' parameter. This may + allow a remote attacker to inject or manipulate SQL queries in the back-end + database, allowing for the manipulation or disclosure of arbitrary data. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/10/6 + - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md + - https://github.com/tongueroo/brbackup/blob/master/lib/brbackup.rb + - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html + - http://www.vapidlabs.com/advisory.php?v=25 + - http://osvdb.org/show/osvdb/108899 +--- diff --git a/advisories/_posts/2014-07-09-OSVDB-108900.md b/advisories/_posts/2014-07-09-OSVDB-108900.md new file mode 100644 index 00000000..abb5a05c --- /dev/null +++ b/advisories/_posts/2014-07-09-OSVDB-108900.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-108900 (brbackup): brbackup Gem for Ruby dbuser Variable Shell Metacharacter + Injection Remote Command Execution' +comments: false +categories: +- brbackup +advisory: + gem: brbackup + osvdb: 108900 + url: https://www.openwall.com/lists/oss-security/2014/07/10/6 + title: brbackup Gem for Ruby dbuser Variable Shell Metacharacter Injection Remote + Command Execution + date: 2014-07-09 + description: | + brbackup Gem for Ruby contains a flaw that is triggered as input passed + via the 'dbuser' variable is not properly sanitized. This may allow a + remote attacker to inject shell metacharacters and execute arbitrary + commands. + notes: Never patched + related: + url: + - https://www.openwall.com/lists/oss-security/2014/07/10/6 + - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md + - http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html + - http://www.vapidlabs.com/advisory.php?v=25 + - http://osvdb.org/show/osvdb/108900 +--- diff --git a/advisories/_posts/2014-08-13-CVE-2013-0334.md b/advisories/_posts/2014-08-13-CVE-2013-0334.md new file mode 100644 index 00000000..6fc45283 --- /dev/null +++ b/advisories/_posts/2014-08-13-CVE-2013-0334.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2013-0334 (bundler): CVE-2013-0334 rubygem-bundler: ''bundle install'' + may install a gem from a source other than expected' +comments: false +categories: +- bundler +advisory: + gem: bundler + cve: 2013-0334 + osvdb: 110004 + ghsa: 49jx-9cmc-xjxm + url: https://nvd.nist.gov/vuln/detail/CVE-2013-0334 + title: 'CVE-2013-0334 rubygem-bundler: ''bundle install'' may install a gem from + a source other than expected' + date: 2014-08-13 + description: | + Bundler before 1.7, when multiple top-level source lines are used, allows + remote attackers to install arbitrary gems by creating a gem with the same name + as another gem in a different source. A flaw was found in the way Bundler handled + gems available from multiple sources. An attacker with access to one of the sources + could create a malicious gem with the same name, which they could then use to trick + a user into installing, potentially resulting in execution of code from the attacker-supplied + malicious gem. + cvss_v2: 5.0 + patched_versions: + - ">= 1.7.0" +--- diff --git a/advisories/_posts/2014-08-18-CVE-2014-3514.md b/advisories/_posts/2014-08-18-CVE-2014-3514.md new file mode 100644 index 00000000..2d6defdb --- /dev/null +++ b/advisories/_posts/2014-08-18-CVE-2014-3514.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2014-3514 (activerecord): Data Injection Vulnerability in Active Record' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2014-3514 + ghsa: 9rf5-jm6f-2fmm + url: https://groups.google.com/forum/#!msg/rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ + title: Data Injection Vulnerability in Active Record + date: 2014-08-18 + description: | + The create_with functionality in Active Record was implemented incorrectly + and completely bypasses the strong parameters protection. Applications which pass + user-controlled values to create_with could allow attackers to set arbitrary attributes + on models. + cvss_v2: 8.7 + unaffected_versions: + - "< 4.0.0" + patched_versions: + - "~> 4.0.9" + - ">= 4.1.5" +--- diff --git a/advisories/_posts/2014-08-22-CVE-2014-5441.md b/advisories/_posts/2014-08-22-CVE-2014-5441.md new file mode 100644 index 00000000..a3f6befc --- /dev/null +++ b/advisories/_posts/2014-08-22-CVE-2014-5441.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2014-5441 (fat_free_crm): Fat Free CRM Gem contains a javascript cross-site + scripting (XSS) vulnerability' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2014-5441 + osvdb: 110420 + ghsa: wcfx-3m6v-4frg + url: https://nvd.nist.gov/vuln/detail/CVE-2014-5441 + title: Fat Free CRM Gem contains a javascript cross-site scripting (XSS) vulnerability + date: 2014-08-22 + description: | + Fat Free CRM Gem contains a javascript cross-site scripting (XSS) + vulnerability. When a user is created/updated using a specifically + crafted username, first name or last name, it is possible for + arbitrary javascript to be executed on all Fat Free CRM pages. + This code would be executed for all logged in users. + cvss_v2: 4.3 + unaffected_versions: + - "<= 0.11.0" + patched_versions: + - ">= 0.13.3" +--- diff --git a/advisories/_posts/2014-08-25-OSVDB-110439.md b/advisories/_posts/2014-08-25-OSVDB-110439.md new file mode 100644 index 00000000..a2150f26 --- /dev/null +++ b/advisories/_posts/2014-08-25-OSVDB-110439.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-110439 (dragonfly): Dragonfly Gem for Ruby Image Uploading & Processing + Remote Command Execution' +comments: false +categories: +- dragonfly +advisory: + gem: dragonfly + osvdb: 110439 + url: https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193 + title: Dragonfly Gem for Ruby Image Uploading & Processing Remote Command Execution + date: 2014-08-25 + description: | + Dragonfly Gem for Ruby contains a flaw in Uploading & Processing + that is due to the gem failing to restrict arbitrary commands to + imagemagicks convert. This may allow a remote attacker to gain + read/write access to the filesystem and execute arbitrary commands. + patched_versions: + - ">= 1.0.7" + related: + url: + - https://github.com/markevans/dragonfly/compare/v1.0.6...v1.0.7 + - https://security.snyk.io/vuln/SNYK-RUBY-DRAGONFLY-20193 + - https://www.mend.io/vulnerability-database/WS-2014-0016 + - http://osvdb.org/show/osvdb/110439 +--- diff --git a/advisories/_posts/2014-09-04-OSVDB-110796.md b/advisories/_posts/2014-09-04-OSVDB-110796.md new file mode 100644 index 00000000..f7391656 --- /dev/null +++ b/advisories/_posts/2014-09-04-OSVDB-110796.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-110796 (flavour_saver): FlavourSaver handlebars helper remote code execution.' +comments: false +categories: +- flavour_saver +advisory: + gem: flavour_saver + osvdb: 110796 + url: https://security.snyk.io/vuln/SNYK-RUBY-FLAVOURSAVER-5457859 + title: FlavourSaver handlebars helper remote code execution. + date: 2014-09-04 + description: | + FlavourSaver contains a flaw in helper method dispatch where it uses + Kernel::send to call helpers without checking that they are defined + within the template context first. This allows expressions such as + {{system "ls"}} or {{eval "puts 1 + 1"}} to be executed. + patched_versions: + - ">= 0.3.3" + related: + url: + - https://github.com/FlavourSaver/FlavourSaver/compare/v0.3.2...v0.3.3 + - https://github.com/FlavourSaver/FlavourSaver/commit/04a8ff444a9a9668a75b01b20b4974d398087a64 + - https://raw.githubusercontent.com/codesake/codesake-dawn/master/Roadmap.md + - https://github.com/slowmistio/dawnscanner-analysis-security-scanner-for-ruby-/blob/master/Roadmap.md + - https://security.snyk.io/vuln/SNYK-RUBY-FLAVOURSAVER-5457859 + - http://osvdb.org/show/osvdb/110796 +--- diff --git a/advisories/_posts/2014-09-25-OSVDB-112683.md b/advisories/_posts/2014-09-25-OSVDB-112683.md new file mode 100644 index 00000000..0ed84a22 --- /dev/null +++ b/advisories/_posts/2014-09-25-OSVDB-112683.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'OSVDB-112683 (as): as Gem for Ruby Process List Local Plaintext Credentials + Disclosure' +comments: false +categories: +- as +advisory: + gem: as + osvdb: 112683 + url: https://security.snyk.io/vuln/SNYK-RUBY-AS-20195 + title: as Gem for Ruby Process List Local Plaintext Credentials Disclosure + date: 2014-09-25 + description: | + as Gem for Ruby contains a flaw that is due to the program displaying + credential information in plaintext in the process list. This may + allow a local attacker to gain access to credential information. + notes: Never patched + related: + url: + - https://security.snyk.io/vuln/SNYK-RUBY-AS-20195 + - http://www.vapid.dhs.org/advisories/as-v1.0.html + - http://www.vapidlabs.com/advisory.php?v=17 + - http://osvdb.org/show/osvdb/112683 +--- diff --git a/advisories/_posts/2014-09-27-CVE-2014-10077.md b/advisories/_posts/2014-09-27-CVE-2014-10077.md new file mode 100644 index 00000000..fc5b48d6 --- /dev/null +++ b/advisories/_posts/2014-09-27-CVE-2014-10077.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2014-10077 (i18n): i18n Gem for Ruby lib/i18n/core_ext/hash.rb Hash#slice() + Function Hash Handling DoS' +comments: false +categories: +- i18n +advisory: + gem: i18n + cve: 2014-10077 + ghsa: 34hf-g744-jw64 + url: https://github.com/svenfuchs/i18n/pull/289 + title: i18n Gem for Ruby lib/i18n/core_ext/hash.rb Hash#slice() Function Hash Handling + DoS + date: 2014-09-27 + description: | + i18n Gem for Ruby contains a flaw in the Hash#slice() function in + lib/i18n/core_ext/hash.rb that is triggered when calling a hash when + :some_key is in keep_keys but not in the hash. This may allow an attacker + to cause the program to crash. + cvss_v3: 7.5 + patched_versions: + - ">= 0.8.0" + related: + osvdb: + - 121500 +--- diff --git a/advisories/_posts/2014-09-29-OSVDB-112346.md b/advisories/_posts/2014-09-29-OSVDB-112346.md new file mode 100644 index 00000000..f00bca7a --- /dev/null +++ b/advisories/_posts/2014-09-29-OSVDB-112346.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-112346 (web-console): Web Console Gem for Ruby contains an unspecified + flaw' +comments: false +categories: +- web-console +advisory: + gem: web-console + osvdb: 112346 + url: https://my.diffend.io/gems/web-console/versions/2.0.0.beta3 + title: Web Console Gem for Ruby contains an unspecified flaw + date: 2014-09-29 + description: | + The Web Console Gem for Ruby on Rails contains an unspecified + flaw that may allow an attacker to have an unspecified impact. + No further details have been provided by the vendor. + patched_versions: + - ">= 2.0.0.beta4" + related: + url: + - https://github.com/rails/web-console/compare/v2.0.0.beta3...v2.0.0.beta4 + - https://my.diffend.io/gems/web-console/versions/2.0.0.beta3 + - https://github.com/slowmistio/dawnscanner-analysis-security-scanner-for-ruby-/blob/master/Roadmap.md + - http://www.osvdb.org/show/osvdb/112346 +--- diff --git a/advisories/_posts/2014-10-13-OSVDB-126330.md b/advisories/_posts/2014-10-13-OSVDB-126330.md new file mode 100644 index 00000000..4e35f50f --- /dev/null +++ b/advisories/_posts/2014-10-13-OSVDB-126330.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'OSVDB-126330 (sidekiq-pro): Sidekiq Pro Gem for Ruby web/views/batch{,es}.erb + Description Element XSS' +comments: false +categories: +- sidekiq-pro +advisory: + gem: sidekiq-pro + osvdb: 126330 + url: https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20197 + title: Sidekiq Pro Gem for Ruby web/views/batch{,es}.erb Description Element XSS + date: 2014-10-13 + description: 'XSS via batch description in Sidekiq::Web + + ' + patched_versions: + - ">= 1.9.1" + related: + url: + - https://github.com/mperham/sidekiq/commit/99b12fb50fe244c5a317f03f1bed9b333ec56ebe + - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20197 +--- diff --git a/advisories/_posts/2014-10-30-CVE-2014-7818.md b/advisories/_posts/2014-10-30-CVE-2014-7818.md new file mode 100644 index 00000000..d9d1dec7 --- /dev/null +++ b/advisories/_posts/2014-10-30-CVE-2014-7818.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2014-7818 (actionpack): Arbitrary file existence disclosure in Action + Pack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2014-7818 + ghsa: 29gr-w57f-rpfw + url: https://groups.google.com/forum/#!topic/rubyonrails-security/dCp7duBiQgo + title: Arbitrary file existence disclosure in Action Pack + date: 2014-10-30 + description: | + Specially crafted requests can be used to determine whether a file exists on + the filesystem that is outside the Rails application's root directory. The + files will not be served, but attackers can determine whether or not the file + exists. + cvss_v2: 4.3 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 3.2.20" + - "~> 4.0.11" + - "~> 4.1.7" + - ">= 4.2.0.beta3" +--- diff --git a/advisories/_posts/2014-10-30-CVE-2014-7819.md b/advisories/_posts/2014-10-30-CVE-2014-7819.md new file mode 100644 index 00000000..90083454 --- /dev/null +++ b/advisories/_posts/2014-10-30-CVE-2014-7819.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2014-7819 (sprockets): CVE-2014-7819 rubygem-sprockets: arbitrary file + existence disclosure' +comments: false +categories: +- sprockets +advisory: + gem: sprockets + cve: 2014-7819 + osvdb: 113965 + ghsa: 33pp-3763-mrfp + url: https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY + title: 'CVE-2014-7819 rubygem-sprockets: arbitrary file existence disclosure' + date: 2014-10-30 + description: | + Multiple directory traversal vulnerabilities in server.rb in Sprockets + before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x + before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, + 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, + and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow + remote attackers to determine the existence of files outside the application root + via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding. + cvss_v2: 5.0 + patched_versions: + - "~> 2.0.5" + - "~> 2.1.4" + - "~> 2.2.3" + - "~> 2.3.3" + - "~> 2.4.6" + - "~> 2.5.1" + - "~> 2.7.1" + - "~> 2.8.3" + - "~> 2.9.4" + - "~> 2.10.2" + - "~> 2.11.3" + - "~> 2.12.3" + - ">= 3.0.0.beta.3" +--- diff --git a/advisories/_posts/2014-11-17-CVE-2014-7829.md b/advisories/_posts/2014-11-17-CVE-2014-7829.md new file mode 100644 index 00000000..eef47bf2 --- /dev/null +++ b/advisories/_posts/2014-11-17-CVE-2014-7829.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2014-7829 (actionpack): Arbitrary file existence disclosure in Action + Pack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2014-7829 + ghsa: h56m-vwxc-3qpw + url: https://groups.google.com/forum/#!topic/rubyonrails-security/rMTQy4oRCGk + title: Arbitrary file existence disclosure in Action Pack + date: 2014-11-17 + description: | + Specially crafted requests can be used to determine whether a file exists on + the filesystem that is outside the Rails application's root directory. The + files will not be served, but attackers can determine whether or not the file + exists. This vulnerability is very similar to CVE-2014-7818, but the + specially crafted string is slightly different. + cvss_v2: 5.0 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 3.2.21" + - "~> 4.0.11.1" + - "~> 4.0.12" + - "~> 4.1.7.1" + - ">= 4.1.8" +--- diff --git a/advisories/_posts/2014-12-04-CVE-2014-9489.md b/advisories/_posts/2014-12-04-CVE-2014-9489.md new file mode 100644 index 00000000..d53cde8b --- /dev/null +++ b/advisories/_posts/2014-12-04-CVE-2014-9489.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2014-9489 (gollum-grit_adapter): gollum-grit_adapter Search Functionality + Allows Arbitrary Command Execution' +comments: false +categories: +- gollum-grit_adapter +advisory: + gem: gollum-grit_adapter + cve: 2014-9489 + url: https://github.com/gollum/gollum/issues/913 + title: gollum-grit_adapter Search Functionality Allows Arbitrary Command Execution + date: 2014-12-04 + description: | + The gollum-grit_adapter gem contains a flaw that can allow arbitrary + command execution. + + Grit implements its search functionality by shelling out to `git grep`. In + turn, `git grep` takes a `-O` or `--open-files-in-pages` option that will + pipe the results of `grep` to an arbitrary process. By failing to properly + sanitize user input search parameters, an attacker can thus perform command + execution. + + Note that the grep result must find the string 'master' (or + whatever is the default branch that gollum uses) in any of the wiki's + documents for this to succeed. + patched_versions: + - ">= 0.1.1" +--- diff --git a/advisories/_posts/2014-12-08-CVE-2014-9490.md b/advisories/_posts/2014-12-08-CVE-2014-9490.md new file mode 100644 index 00000000..36484168 --- /dev/null +++ b/advisories/_posts/2014-12-08-CVE-2014-9490.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2014-9490 (sentry-raven): sentry-raven Gem for Ruby contains a flaw that + can result in a denial of service' +comments: false +categories: +- sentry-raven +advisory: + gem: sentry-raven + cve: 2014-9490 + osvdb: 115654 + ghsa: c9c5-9fpr-m882 + url: https://nvd.nist.gov/vuln/detail/CVE-2014-9490 + title: sentry-raven Gem for Ruby contains a flaw that can result in a denial of + service + date: 2014-12-08 + description: | + Sentry raven-ruby contains a flaw in the lib/raven/okjson.rb script that + is triggered when large numeric values are stored as an exponent or in scientific + notation. With a specially crafted request, an attacker can cause the software to + consume excessive resources resulting in a denial of service. + cvss_v2: 5.0 + patched_versions: + - ">= 0.12.2" +--- diff --git a/advisories/_posts/2014-12-18-CVE-2014-8144.md b/advisories/_posts/2014-12-18-CVE-2014-8144.md new file mode 100644 index 00000000..dc4046be --- /dev/null +++ b/advisories/_posts/2014-12-18-CVE-2014-8144.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2014-8144 (doorkeeper): Cross-site request forgery (CSRF) vulnerability + in doorkeeper 1.4.0 and earlier.' +comments: false +categories: +- doorkeeper +advisory: + gem: doorkeeper + cve: 2014-8144 + osvdb: 116010 + ghsa: 685w-vc84-wxcx + url: https://groups.google.com/forum/#!topic/ruby-security-ann/5_VqJtNc8jw + title: Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0 and earlier. + date: 2014-12-18 + description: | + Cross-site request forgery (CSRF) vulnerability in doorkeeper 1.4.0 + and earlier allows remote attackers to hijack the user's OAuth + autorization code. This vulnerability has been assigned the CVE + identifier CVE-2014-8144. + + Doorkeeper's endpoints didn't have CSRF protection. Any HTML document + on the Internet can then read a user's authorization code with + arbitrary scope from any Doorkeeper-compatible Rails app you are + logged in. + cvss_v2: 6.8 + patched_versions: + - "~> 1.4.1" + - ">= 2.0.0" +--- diff --git a/advisories/_posts/2015-02-03-OSVDB-117903.md b/advisories/_posts/2015-02-03-OSVDB-117903.md new file mode 100644 index 00000000..b558a121 --- /dev/null +++ b/advisories/_posts/2015-02-03-OSVDB-117903.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-117903 (ruby-saml): Ruby-Saml Gem is vulnerable to arbitrary code execution' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + osvdb: 117903 + url: https://advisories.dxw.com/advisories/publicly-exploitable-command-injection-in-ruby-saml-0-7-2-library-can-root-the-host + title: Ruby-Saml Gem is vulnerable to arbitrary code execution + date: 2015-02-03 + description: | + ruby-saml contains a flaw that is triggered as the URI value of a + SAML response is not properly sanitized through a prepared statement. + This may allow a remote attacker to execute arbitrary shell commands + on the host machine. + patched_versions: + - ">= 0.8.2" + related: + url: + - https://advisories.dxw.com/advisories/publicly-exploitable-command-injection-in-ruby-saml-0-7-2-library-can-root-the-host + - https://seclists.org/oss-sec/2015/q3/282 + - https://github.com/SAML-Toolkits/ruby-saml/pull/225#issuecomment-120084288 + - https://github.com/SAML-Toolkits/ruby-saml/commit/1b4e3dd6d2d44efa629144b2180842456bfb2a0f#diff-661b9d9743a3ff77661f224c6191165cL242 + - https://www.mend.io/vulnerability-database/WS-2015-0040 + - http://www.osvdb.org/show/osvdb/117903 +--- diff --git a/advisories/_posts/2015-02-10-CVE-2015-1426.md b/advisories/_posts/2015-02-10-CVE-2015-1426.md new file mode 100644 index 00000000..37c53c74 --- /dev/null +++ b/advisories/_posts/2015-02-10-CVE-2015-1426.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2015-1426 (facter): Puppet Labs Facter allows local users to obtains sensitive + Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node.' +comments: false +categories: +- facter +advisory: + gem: facter + cve: 2015-1426 + ghsa: j436-h7hm-rx46 + url: https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata + title: Puppet Labs Facter allows local users to obtains sensitive Amazon EC2 IAM + instance metadata by reading a fact for an Amazon EC2 node. + date: 2015-02-10 + description: | + Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to + obtains sensitive Amazon EC2 IAM instance metadata by reading + a fact for an Amazon EC2 node. + cvss_v2: 2.1 + cvss_v3: 1.3 + unaffected_versions: + - "< 1.6.0" + patched_versions: + - ">= 2.4.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-1426 + - https://www.puppet.com/security/cve/cve-2015-1426-potential-sensitive-information-leakage-facters-amazon-ec2-metadata + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/disclosure-amazon-ec2-iam-instance/ruby/sid-1508/summary + - https://srcclr.com/security/disclosure-amazon-ec2-iam-instance/ruby/s-1508 + - https://github.com/rubysec/ruby-advisory-db/issues/238 + - https://github.com/advisories/GHSA-j436-h7hm-rx46 +--- diff --git a/advisories/_posts/2015-02-10-OSVDB-118830.md b/advisories/_posts/2015-02-10-OSVDB-118830.md new file mode 100644 index 00000000..43d1945f --- /dev/null +++ b/advisories/_posts/2015-02-10-OSVDB-118830.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'OSVDB-118830 (doorkeeper): Doorkeeper Gem for Ruby stores sensitive information + in production logs' +comments: false +categories: +- doorkeeper +advisory: + gem: doorkeeper + osvdb: 118830 + url: https://www.versioneye.com/Ruby/doorkeeper/2.1.1 + title: Doorkeeper Gem for Ruby stores sensitive information in production logs + date: 2015-02-10 + description: | + Doorkeeper Gem for Ruby contains a flaw in lib/doorkeeper/engine.rb. + The issue is due to the program storing sensitive information in + production logs. This may allow a local attacker to gain access to + sensitive information. + patched_versions: + - "~> 1.4.2" + - ">= 2.1.2" + related: + url: + - https://www.versioneye.com/Ruby/doorkeeper/2.1.1 + - https://github.com/doorkeeper-gem/doorkeeper/commit/d6bca5f32b741b8cee83a4aeb818338b919181fe + - https://github.com/doorkeeper-gem/doorkeeper/blob/main/lib/doorkeeper/engine.rb + - https://github.com/doorkeeper-gem/doorkeeper/issues/576 + - https://github.com/rubysec/ruby-advisory-db/pull/128 + - https://my.diffend.io/gems/doorkeeper/versions/0.3.0 + - https://security.snyk.io/vuln/SNYK-RUBY-DOORKEEPER-20206 + - https://www.mend.io/vulnerability-database/WS-2015-0039 + - http://www.osvdb.org/show/osvdb/118830 + notes: 'Issue #576 backported to 1.4.x on March 2, 2015.' +--- diff --git a/advisories/_posts/2015-02-16-CVE-2015-1585.md b/advisories/_posts/2015-02-16-CVE-2015-1585.md new file mode 100644 index 00000000..563972f4 --- /dev/null +++ b/advisories/_posts/2015-02-16-CVE-2015-1585.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2015-1585 (fat_free_crm): Fat Free CRM Gem being vulnerable to CSRF-type + attacks' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2015-1585 + osvdb: 118465 + ghsa: wx7c-8j35-mpg8 + url: https://nvd.nist.gov/vuln/detail/CVE-2015-1585 + title: Fat Free CRM Gem being vulnerable to CSRF-type attacks + date: 2015-02-16 + description: | + Fat Free CRM contains a flaw as HTTP requests to /admin/users do not require + multiple steps, explicit confirmation, or a unique token when performing + certain sensitive actions. By tricking a user into following a specially + crafted link, a context-dependent attacker can perform a Cross-Site Request + Forgery (CSRF / XSRF) attack causing the victim to creating administrative + users. + cvss_v2: 6.8 + patched_versions: + - ">= 0.13.6" +--- diff --git a/advisories/_posts/2015-02-17-CVE-2015-2179.md b/advisories/_posts/2015-02-17-CVE-2015-2179.md new file mode 100644 index 00000000..ae71115c --- /dev/null +++ b/advisories/_posts/2015-02-17-CVE-2015-2179.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2015-2179 (xaviershay-dm-rails): xaviershay-dm-rails Gem for Ruby exposes + sensitive information via the process table' +comments: false +categories: +- xaviershay-dm-rails +advisory: + gem: xaviershay-dm-rails + cve: 2015-2179 + osvdb: 118579 + ghsa: 88p8-4vv5-82j7 + url: https://nvd.nist.gov/vuln/detail/CVE-2015-2179 + title: xaviershay-dm-rails Gem for Ruby exposes sensitive information via the process + table + date: 2015-02-17 + description: | + xaviershay-dm-rails Gem for Ruby contains a flaw in the execute() function + in /datamapper/dm-rails/blob/master/lib/dm-rails/storage.rb. The issue is + due to the function exposing sensitive information via the process table. + This may allow a local attack to gain access to MySQL credential information. + cvss_v3: 5.5 +--- diff --git a/advisories/_posts/2015-03-05-OSVDB-119205.md b/advisories/_posts/2015-03-05-OSVDB-119205.md new file mode 100644 index 00000000..de99b1e3 --- /dev/null +++ b/advisories/_posts/2015-03-05-OSVDB-119205.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'OSVDB-119205 (spree): Spree API Information Disclosure CSRF' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 119205 + url: https://web.archive.org/web/20150920092934/https://spreecommerce.com/blog/security-updates-2015-3-3 + title: Spree API Information Disclosure CSRF + date: 2015-03-05 + description: | + Spree contains a flaw in the API as HTTP requests do not require + multiple steps, explicit confirmation, or a unique token when + performing certain sensitive actions. By tricking a user into + following a specially crafted link, a context-dependent attacker + can perform a Cross-Site Request Forgery (CSRF / XSRF) attack + causing the victim to disclose potentially sensitive information + to attackers. + patched_versions: + - "~> 2.2.10" + - "~> 2.3.8" + - "~> 2.4.5" + - ">= 3.0.0.rc4" + related: + url: + - https://web.archive.org/web/20150920092934/https://spreecommerce.com/blog/security-updates-2015-3-3 + - https://seclists.org/oss-sec/2015/q3/275 + - https://github.com/spree/spree/commit/bfb5f907219d6f8f879ca940882befe89b58a1a4 + - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20360 + - https://github.com/rubysec/bundler-audit/issues/106 +--- diff --git a/advisories/_posts/2015-03-24-CVE-2015-1820.md b/advisories/_posts/2015-03-24-CVE-2015-1820.md new file mode 100644 index 00000000..65eed0d2 --- /dev/null +++ b/advisories/_posts/2015-03-24-CVE-2015-1820.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2015-1820 (rest-client): CVE-2015-1820 rubygem-rest-client: session fixation + vulnerability Set-Cookie headers present in an HTTP 30x redirection responses' +comments: false +categories: +- rest-client +advisory: + gem: rest-client + cve: 2015-1820 + osvdb: 119878 + ghsa: 3fhf-6939-qg8p + url: https://github.com/rest-client/rest-client/issues/369 + title: 'CVE-2015-1820 rubygem-rest-client: session fixation vulnerability Set-Cookie + headers present in an HTTP 30x redirection responses' + date: 2015-03-24 + description: | + REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers + to conduct session fixation attacks or obtain sensitive cookie information by leveraging + passage of cookies set in a response to a redirect. + cvss_v3: 9.8 + unaffected_versions: + - "<= 1.6.0" + patched_versions: + - ">= 1.8.0" +--- diff --git a/advisories/_posts/2015-03-24-CVE-2015-1828.md b/advisories/_posts/2015-03-24-CVE-2015-1828.md new file mode 100644 index 00000000..434e1e25 --- /dev/null +++ b/advisories/_posts/2015-03-24-CVE-2015-1828.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2015-1828 (http): HTTPS MitM vulnerability in http.rb' +comments: false +categories: +- http +advisory: + gem: http + cve: 2015-1828 + osvdb: 119927 + ghsa: 6wpv-cj6x-v3jw + url: https://groups.google.com/forum/#!topic/httprb/jkb4oxwZjkU + title: HTTPS MitM vulnerability in http.rb + date: 2015-03-24 + description: | + http.rb failed to call the OpenSSL::SSL::SSLSocket#post_connection_check method to perform hostname verification. + Because of this, an attacker with a valid certificate but with a mismatched subject can perform a MitM attack. + cvss_v2: 5.0 + cvss_v3: 5.9 + patched_versions: + - ">= 0.7.3" + - "~> 0.6.4" +--- diff --git a/advisories/_posts/2015-04-07-OSVDB-120415.md b/advisories/_posts/2015-04-07-OSVDB-120415.md new file mode 100644 index 00000000..d66d2522 --- /dev/null +++ b/advisories/_posts/2015-04-07-OSVDB-120415.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'OSVDB-120415 (redcarpet): redcarpet Gem for Ruby markdown.c parse_inline() + Function XSS' +comments: false +categories: +- redcarpet +advisory: + gem: redcarpet + osvdb: 120415 + url: http://danlec.com/blog/bug-in-sundown-and-redcarpet + title: redcarpet Gem for Ruby markdown.c parse_inline() Function XSS + date: 2015-04-07 + description: | + redcarpet Gem for Ruby contains a flaw that allows a cross-site scripting + (XSS) attack. This flaw exists because the parse_inline() function in + markdown.c does not validate input before returning it to users. This may + allow a remote attacker to create a specially crafted request that would + execute arbitrary script code in a user's browser session within the trust + relationship between their browser and the server. + patched_versions: + - ">= 3.2.3" + related: + url: + - https://github.com/vmg/redcarpet/releases/tag/v3.2.3 + - http://danlec.com/blog/bug-in-sundown-and-redcarpet + - https://hackerone.com/reports/46916 + - https://github.com/vmg/redcarpet/blob/master/ext/redcarpet/markdown.c + - https://github.com/Homebrew/brew.sh/issues/75 + - https://git.revreso.de/gigadoc2/diaspora/-/tags/v0.4.1.3 + - https://www.rapid7.com/db/vulnerabilities/freebsd-vid-c368155a-fa83-11e4-bc58-001e67150279 + - https://www.mend.io/vulnerability-database/WS-2015-0038 +--- diff --git a/advisories/_posts/2015-04-14-CVE-2015-1819.md b/advisories/_posts/2015-04-14-CVE-2015-1819.md new file mode 100644 index 00000000..6a6740a7 --- /dev/null +++ b/advisories/_posts/2015-04-14-CVE-2015-1819.md @@ -0,0 +1,61 @@ +--- +layout: advisory +title: 'CVE-2015-1819 (nokogiri): Nokogiri gem contains several vulnerabilities in + libxml2 and libxslt' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2015-1819 + ghsa: q7wx-62r7-j2x7 + url: https://github.com/sparklemotion/nokogiri/issues/1374 + title: Nokogiri gem contains several vulnerabilities in libxml2 and libxslt + date: 2015-04-14 + description: | + Several vulnerabilities were discovered in the libxml2 and libxslt libraries + that the Nokogiri gem depends on. + + CVE-2015-1819 + A denial of service flaw was found in the way libxml2 parsed XML + documents. This flaw could cause an application that uses libxml2 to use an + excessive amount of memory. + + CVE-2015-7941 + libxml2 does not properly stop parsing invalid input, which allows + context-dependent attackers to cause a denial of service (out-of-bounds read + and libxml2 crash) via crafted specially XML data. + + CVE-2015-7942 + The xmlParseConditionalSections function in parser.c in libxml2 + does not properly skip intermediary entities when it stops parsing invalid + input, which allows context-dependent attackers to cause a denial of service + (out-of-bounds read and crash) via crafted XML data. + + CVE-2015-7995 + The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not + check whether the parent node is an element, which allows attackers to cause + a denial of service using a specially crafted XML document. + + CVE-2015-8035 + The xz_decomp function in xzlib.c in libxml2 2.9.1 does not + properly detect compression errors, which allows context-dependent attackers + to cause a denial of service (process hang) via crafted XML data. + + Another vulnerability was discoverd in libxml2 that could cause parsing + of unclosed comments to result in "conditional jump or move depends on + uninitialized value(s)" and unsafe memory access. This issue does not have a + CVE assigned yet. See related URLs for details. Patched in v1.6.7.rc4. + patched_versions: + - "~> 1.6.6.4" + - ">= 1.6.7.rc4" + related: + cve: + - 2015-7941 + - 2015-7942 + - 2015-7995 + - 2015-8035 + url: + - https://github.com/sparklemotion/nokogiri/pull/1376 + - https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59 +--- diff --git a/advisories/_posts/2015-04-14-CVE-2015-1866.md b/advisories/_posts/2015-04-14-CVE-2015-1866.md new file mode 100644 index 00000000..bc01e298 --- /dev/null +++ b/advisories/_posts/2015-04-14-CVE-2015-1866.md @@ -0,0 +1,36 @@ +--- +layout: advisory +title: 'CVE-2015-1866 (ember-source): Ember.js XSS Vulnerability With {{view "select"}} + Options' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2015-1866 + ghsa: mp78-r56v-45qc + url: https://groups.google.com/forum/#!topic/ember-security/nbntfs2EbRU + title: Ember.js XSS Vulnerability With {{view "select"}} Options + date: 2015-04-14 + description: | + In general, Ember.js escapes or strips any user-supplied content before + inserting it in strings that will be sent to innerHTML. However, a + change made to the implementation of the select view means that any + user-supplied data bound to an option's label will not be escaped + correctly. + + In applications that use Ember's select view and pass user-supplied + content to the label, a specially-crafted payload could execute + arbitrary JavaScript in the context of the current domain ("XSS"). + + All users running an affected release and binding user-supplied data to + the select options should either upgrade or use one of the workarounds + immediately. + cvss_v3: 6.1 + unaffected_versions: + - "< 1.10.0" + patched_versions: + - "~> 1.10.1" + - "~> 1.11.2" + - ">= 1.12.0" +--- diff --git a/advisories/_posts/2015-04-15-OSVDB-120857.md b/advisories/_posts/2015-04-15-OSVDB-120857.md new file mode 100644 index 00000000..32ed8450 --- /dev/null +++ b/advisories/_posts/2015-04-15-OSVDB-120857.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-120857 (refile): refile Gem for Ruby contains a remote code execution + vulnerability' +comments: false +categories: +- refile +advisory: + gem: refile + osvdb: 120857 + url: https://groups.google.com/g/ruby-security-ann/c/VIfMO2LvzNs + title: refile Gem for Ruby contains a remote code execution vulnerability + date: 2015-04-15 + description: | + refile Gem for Ruby contains a flaw that is triggered when input is not + sanitized when handling the 'remote_image_url' field in a form, where + 'image' is the name of the attachment. This may allow a remote attacker + to execute arbitrary shell commands. + unaffected_versions: + - "< 0.5.0" + patched_versions: + - ">= 0.5.4" + related: + url: + - https://groups.google.com/g/ruby-security-ann/c/VIfMO2LvzNs +--- diff --git a/advisories/_posts/2015-04-21-OSVDB-125678.md b/advisories/_posts/2015-04-21-OSVDB-125678.md new file mode 100644 index 00000000..5ea6dbd9 --- /dev/null +++ b/advisories/_posts/2015-04-21-OSVDB-125678.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-125678 (sidekiq): Sidekiq Gem for Ruby web/views/queue.erb msg.display_class + Element XSS' +comments: false +categories: +- sidekiq +advisory: + gem: sidekiq + osvdb: 125678 + url: https://seclists.org/oss-sec/2015/q3/267 + title: Sidekiq Gem for Ruby web/views/queue.erb msg.display_class Element XSS + date: 2015-04-21 + description: 'XSS via job arguments display class in Sidekiq::Web + + ' + patched_versions: + - ">= 3.4.0" + related: + url: + - https://seclists.org/oss-sec/2015/q3/267 + - https://github.com/mperham/sidekiq/pull/2309 + - https://github.com/sidekiq/sidekiq/commit/54766f336620ca0ce3b0b87a7a56382496e64b61 +--- diff --git a/advisories/_posts/2015-04-29-CVE-2015-20108.md b/advisories/_posts/2015-04-29-CVE-2015-20108.md new file mode 100644 index 00000000..31709554 --- /dev/null +++ b/advisories/_posts/2015-04-29-CVE-2015-20108.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2015-20108 (ruby-saml): ruby-saml gem is vulnerable to XPath injection' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + osvdb: 124991 + cve: 2015-20108 + ghsa: r364-2pj4-pf7f + url: https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217 + title: ruby-saml gem is vulnerable to XPath injection + date: 2015-04-29 + description: | + xml_security.rb in the ruby-saml gem before 1.0.0 for Ruby + allows XPath injection and code execution because prepared + statements are not used. + + The lack of prepared statements allows for possibly command + injection, leading to arbitrary code execution. + cvss_v2: 6.7 + cvss_v3: 9.8 + patched_versions: + - ">= 1.0.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-20108 + - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0 + - https://github.com/SAML-Toolkits/ruby-saml/pull/225 + - https://github.com/SAML-Toolkits/ruby-saml/commit/9853651b96b99653ea8627d757d46bfe62ab6448 + - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217 + - https://www.mend.io/vulnerability-database/WS-2015-0036 + - https://github.com/advisories/GHSA-r364-2pj4-pf7f +--- diff --git a/advisories/_posts/2015-04-29-CVE-2015-3448.md b/advisories/_posts/2015-04-29-CVE-2015-3448.md new file mode 100644 index 00000000..5b964047 --- /dev/null +++ b/advisories/_posts/2015-04-29-CVE-2015-3448.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2015-3448 (rest-client): rest-client ruby gem logs sensitive information' +comments: false +categories: +- rest-client +advisory: + gem: rest-client + cve: 2015-3448 + ghsa: mx9f-w8qq-q5jf + url: https://github.com/rest-client/rest-client/issues/349 + title: rest-client ruby gem logs sensitive information + date: 2015-04-29 + description: | + REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and + passwords, which allows local users to obtain sensitive information by reading the + log. + cvss_v2: 2.1 + patched_versions: + - ">= 1.7.3" +--- diff --git a/advisories/_posts/2015-04-29-OSVDB-124991.md b/advisories/_posts/2015-04-29-OSVDB-124991.md new file mode 100644 index 00000000..e5188bf6 --- /dev/null +++ b/advisories/_posts/2015-04-29-OSVDB-124991.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-124991 (ruby-saml): Ruby-Saml Gem is vulnerable to XPath Injection' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + osvdb: 124991 + url: https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0 + title: Ruby-Saml Gem is vulnerable to XPath Injection + date: 2015-04-29 + description: | + ruby-saml before 1.0.0 is vulnerable to XPath injection on + xml_security.rb. The lack of prepared statements allows for + possibly command injection, leading to arbitrary code execution. + cvss_v2: 6.7 + patched_versions: + - ">= 1.0.0" + related: + url: + - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0 + - https://github.com/SAML-Toolkits/ruby-saml/pull/225 + - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20217 + - https://www.mend.io/vulnerability-database/WS-2015-0036 +--- diff --git a/advisories/_posts/2015-05-05-CVE-2015-3649.md b/advisories/_posts/2015-05-05-CVE-2015-3649.md new file mode 100644 index 00000000..27bc76df --- /dev/null +++ b/advisories/_posts/2015-05-05-CVE-2015-3649.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2015-3649 (open-uri-cached): open-uri-cached Gem for Ruby Unsafe Temporary + File Creation Local Privilege Escalation' +comments: false +categories: +- open-uri-cached +advisory: + gem: open-uri-cached + cve: 2015-3649 + osvdb: 121701 + ghsa: 7m2w-9gw7-c3xp + url: http://seclists.org/oss-sec/2015/q2/373 + title: open-uri-cached Gem for Ruby Unsafe Temporary File Creation Local Privilege + Escalation + date: 2015-05-05 + description: | + open-uri-cached Gem for Ruby contains a flaw that is due to the + program creating temporary files in a predictable, unsafe manner when using + YAML. This may allow a local attacker to gain elevated privileges. + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2015-05-11-OSVDB-126329.md b/advisories/_posts/2015-05-11-OSVDB-126329.md new file mode 100644 index 00000000..ccbddb1e --- /dev/null +++ b/advisories/_posts/2015-05-11-OSVDB-126329.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-126329 (sidekiq-pro): Sidekiq Pro Gem for Ruby web/views/batch.erb Class + and ErrorMessage Elements Reflected XSS' +comments: false +categories: +- sidekiq-pro +advisory: + gem: sidekiq-pro + osvdb: 126329 + url: https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#202 + title: Sidekiq Pro Gem for Ruby web/views/batch.erb Class and ErrorMessage Elements + Reflected XSS + date: 2015-05-11 + description: 'XSS via batch failure error_class and error_message in Sidekiq::Web + + ' + patched_versions: + - ">= 2.0.2" + related: + url: + - https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#202 + - https://github.com/mperham/sidekiq/commit/a695ff347ae50f641dfc35189131b232ea0aa1db + - https://github.com/sidekiq/sidekiq/issues/2467 + - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20219 +--- diff --git a/advisories/_posts/2015-05-14-CVE-2015-3900.md b/advisories/_posts/2015-05-14-CVE-2015-3900.md new file mode 100644 index 00000000..740257db --- /dev/null +++ b/advisories/_posts/2015-05-14-CVE-2015-3900.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2015-3900 (rubygems-update): CVE-2015-3900 rubygems: DNS hijacking vulnerability + in api_endpoint()' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2015-3900 + osvdb: 122162 + ghsa: wp3j-rvfp-624h + url: https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356 + title: 'CVE-2015-3900 rubygems: DNS hijacking vulnerability in api_endpoint()' + date: 2015-05-14 + description: | + RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 + does not validate the hostname when fetching gems or making API requests, which + allows remote attackers to redirect requests to arbitrary domains via a crafted + DNS SRV record, aka a "DNS hijack attack." A flaw was found in a way rubygems verified + the API endpoint hostname retrieved through a DNS SRV record. A man-in-the-middle + attacker could use this flaw to force a client to download content from an untrusted + domain. + cvss_v2: 5.0 + patched_versions: + - "~> 2.0.16" + - "~> 2.2.4" + - ">= 2.4.7" +--- diff --git a/advisories/_posts/2015-05-25-CVE-2015-9284.md b/advisories/_posts/2015-05-25-CVE-2015-9284.md new file mode 100644 index 00000000..a406d8b6 --- /dev/null +++ b/advisories/_posts/2015-05-25-CVE-2015-9284.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2015-9284 (omniauth): CSRF vulnerability in OmniAuth''s request phase' +comments: false +categories: +- omniauth +advisory: + gem: omniauth + cve: 2015-9284 + ghsa: ww4x-rwq6-qpgf + url: https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284 + title: CSRF vulnerability in OmniAuth's request phase + date: 2015-05-25 + description: | + The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site + Request Forgery (CSRF) when used as part of the Ruby on Rails framework, allowing + accounts to be connected without user intent, user interaction, or feedback to + the user. This permits a secondary account to be able to sign into the web + application as the primary account. + + In order to mitigate this vulnerability, Rails users should consider using the + `omniauth-rails_csrf_protection` gem. + + More info is available here: https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284 + cvss_v2: 6.8 + cvss_v3: 8.8 + patched_versions: + - ">= 2.0.0" + related: + url: + - https://github.com/omniauth/omniauth/pull/809 + - https://github.com/cookpad/omniauth-rails_csrf_protection +--- diff --git a/advisories/_posts/2015-06-04-CVE-2015-4410.md b/advisories/_posts/2015-06-04-CVE-2015-4410.md new file mode 100644 index 00000000..e5e0634c --- /dev/null +++ b/advisories/_posts/2015-06-04-CVE-2015-4410.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2015-4410 (moped): Data Injection Vulnerability in moped Rubygem' +comments: false +categories: +- moped +advisory: + gem: moped + cve: 2015-4410 + ghsa: f93j-hmcr-jcwh + url: http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html + title: Data Injection Vulnerability in moped Rubygem + date: 2015-06-04 + description: | + A flaw in the ObjectId validation regular expression can enable attackers + to inject arbitrary information into a given BSON object. + cvss_v3: 7.5 + patched_versions: + - "~> 1.5.3" + - ">= 2.0.5" + related: + url: + - https://github.com/mongoid/moped/compare/e5fc928bcb5b7b89d171e31e31483be4185971b9...32cba17ad7d3da326778b4d8cd4b52e75bca9d40 + - https://github.com/mongoid/moped/commit/276fbfd23c5ffb65e6bd18d564c8b6878c2498ac +--- diff --git a/advisories/_posts/2015-06-04-CVE-2015-4412.md b/advisories/_posts/2015-06-04-CVE-2015-4412.md new file mode 100644 index 00000000..101cfc72 --- /dev/null +++ b/advisories/_posts/2015-06-04-CVE-2015-4412.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2015-4412 (bson): Data Injection Vulnerability in bson Rubygem' +comments: false +categories: +- bson +advisory: + gem: bson + cve: 2015-4412 + ghsa: h6rj-8r3c-9gpj + url: http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html + title: Data Injection Vulnerability in bson Rubygem + date: 2015-06-04 + description: | + A flaw in the ObjectId validation regular expression can enable attackers + to inject arbitrary information into a given BSON object. + cvss_v3: 9.8 + patched_versions: + - "~> 1.12.3" + - ">= 3.0.4" + related: + url: + - https://github.com/mongodb/mongo-ruby-driver/compare/6ae981167759d5819ba3d41e374e5b2af5b79077~1...9859a3ab9773a8a883eb8438b665a921cc991c71 + - https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7 +--- diff --git a/advisories/_posts/2015-06-04-OSVDB-125676.md b/advisories/_posts/2015-06-04-OSVDB-125676.md new file mode 100644 index 00000000..29b71507 --- /dev/null +++ b/advisories/_posts/2015-06-04-OSVDB-125676.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-125676 (sidekiq): Sidekiq Gem for Ruby web/views/queue.erb Element Reflected + XSS' +comments: false +categories: +- sidekiq +advisory: + gem: sidekiq + osvdb: 125676 + url: https://seclists.org/oss-sec/2015/q3/267 + title: Sidekiq Gem for Ruby web/views/queue.erb Element Reflected XSS + date: 2015-06-04 + description: | + Sidekiq Gem for Ruby web/views/queue.erb [CurrentMessagesInQueue, + AreYouSureDeleteQueue] Element Reflected XSS + patched_versions: + - ">= 3.4.0" + related: + osvdb: + - 125677 + url: + - https://seclists.org/oss-sec/2015/q3/267 + - https://github.com/mperham/sidekiq/issues/2330 + - https://github.com/sidekiq/sidekiq/commit/2178d66b6686fbf4430223c34c184a64c9906828 + - https://github.com/rubysec/ruby-advisory-db/pull/196 + - https://github.com/rubysec/ruby-advisory-db/commit/19a8fc075a6cc0702f978219c88d97c666fecdbd +--- diff --git a/advisories/_posts/2015-06-05-CVE-2015-2963.md b/advisories/_posts/2015-06-05-CVE-2015-2963.md new file mode 100644 index 00000000..ffd44c4b --- /dev/null +++ b/advisories/_posts/2015-06-05-CVE-2015-2963.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2015-2963 (paperclip): Paperclip Gem for Ruby vulnerable to content type + spoofing' +comments: false +categories: +- paperclip +advisory: + gem: paperclip + cve: 2015-2963 + ghsa: 6jvm-3j5h-79f6 + url: https://robots.thoughtbot.com/paperclip-security-release + title: Paperclip Gem for Ruby vulnerable to content type spoofing + date: 2015-06-05 + description: | + There is an issue where if an HTML file is uploaded with a .html + extension, but the content type is listed as being `image/jpeg`, this + will bypass a validation checking for images. But it will also pass the + spoof check, because a file named .html and containing actual HTML + passes the spoof check. + cvss_v2: 4.3 + patched_versions: + - ">= 4.2.2" +--- diff --git a/advisories/_posts/2015-06-08-CVE-2015-4020.md b/advisories/_posts/2015-06-08-CVE-2015-4020.md new file mode 100644 index 00000000..f383325c --- /dev/null +++ b/advisories/_posts/2015-06-08-CVE-2015-4020.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2015-4020 (rubygems-update): RubyGems remote_fetcher.rb api_endpoint() + Function Missing SRV Record Hostname Validation Request Hijacking' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2015-4020 + ghsa: qv62-xfj6-32xm + url: https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-009/?fid=6478 + title: RubyGems remote_fetcher.rb api_endpoint() Function Missing SRV Record Hostname + Validation Request Hijacking + date: 2015-06-08 + description: | + RubyGems contains a flaw in the api_endpoint() function in remote_fetcher.rb + that is triggered when handling hostnames in SRV records. With a specially + crafted response, a context-dependent attacker may conduct DNS hijacking + attacks. This vulnerability is due to an incomplete fix for CVE-2015-3900, + which allowed redirection to an arbitrary gem server in any security domain. + cvss_v2: 5.0 + patched_versions: + - "~> 2.0.17" + - "~> 2.2.5" + - ">= 2.4.8" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-1840.md b/advisories/_posts/2015-06-16-CVE-2015-1840.md new file mode 100644 index 00000000..28cb4603 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-1840.md @@ -0,0 +1,43 @@ +--- +layout: advisory +title: 'CVE-2015-1840 (jquery-ujs): CSRF Vulnerability in jquery-ujs' +comments: false +categories: +- jquery-ujs +advisory: + gem: jquery-ujs + cve: 2015-1840 + ghsa: 4whc-pp4x-9pf3 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY + title: CSRF Vulnerability in jquery-ujs + date: 2015-06-16 + description: | + In the scenario where an attacker might be able to control the href attribute + of an anchor tag or the action attribute of a form tag that will trigger a + POST action, the attacker can set the href or action to + " https://attacker.com" (note the leading space) that will be passed to + JQuery, who will see this as a same origin request, and send the user's CSRF + token to the attacker domain. + + To work around this problem, change code that allows users to control the + href attribute of an anchor tag or the action attribute of a form tag to + filter the user parameters. + + For example, code like this: + + link_to params + + to code like this: + + link_to filtered_params + + def filtered_params + \# Filter just the parameters that you trust + end + + See also: + - http://blog.honeybadger.io/understanding-the-rails-jquery-csrf-vulnerability-cve-2015-1840/ + cvss_v2: 5.0 + patched_versions: + - ">= 1.0.4" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-3224.md b/advisories/_posts/2015-06-16-CVE-2015-3224.md new file mode 100644 index 00000000..1a719657 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-3224.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2015-3224 (web-console): IP whitelist bypass in Web Console' +comments: false +categories: +- web-console +advisory: + gem: web-console + cve: 2015-3224 + ghsa: 67j6-xv27-w6ww + url: https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw + title: IP whitelist bypass in Web Console + date: 2015-06-16 + description: | + Specially crafted remote requests can spoof their origin, bypassing the IP whitelist, in any environment where Web Console is enabled (development and test, by default). + + Users whose application is only accessible from localhost (as is the default behaviour in Rails 4.2) are not affected, unless a local proxy is involved. + + All affected users should either upgrade or use one of the work arounds immediately. + + To work around this issue, turn off web-console in all environments, by removing/commenting it from the application's Gemfile. + patched_versions: + - ">= 2.1.3" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-3225.md b/advisories/_posts/2015-06-16-CVE-2015-3225.md new file mode 100644 index 00000000..217bba83 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-3225.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2015-3225 (rack): Potential Denial of Service Vulnerability in Rack' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2015-3225 + ghsa: rgr4-9jh5-j4j6 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/gcUbICUmKMc + title: Potential Denial of Service Vulnerability in Rack + date: 2015-06-16 + description: | + Carefully crafted requests can cause a `SystemStackError` and potentially + cause a denial of service attack. + + All users running an affected release should upgrade. + patched_versions: + - ">= 1.6.2" + - "~> 1.5.4" + - "~> 1.4.6" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-3226.md b/advisories/_posts/2015-06-16-CVE-2015-3226.md new file mode 100644 index 00000000..9074ed63 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-3226.md @@ -0,0 +1,58 @@ +--- +layout: advisory +title: 'CVE-2015-3226 (activesupport): XSS Vulnerability in ActiveSupport::JSON.encode' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2015-3226 + ghsa: vxvp-4xwc-jpp6 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/7VlB_pck3hU + title: XSS Vulnerability in ActiveSupport::JSON.encode + date: 2015-06-16 + description: | + When a `Hash` containing user-controlled data is encode as JSON (either through + `Hash#to_json` or `ActiveSupport::JSON.encode`), Rails does not perform adequate + escaping that matches the guarantee implied by the `escape_html_entities_in_json` + option (which is enabled by default). If this resulting JSON string is subsequently + inserted directly into an HTML page, the page will be vulnerable to XSS attacks. + + For example, the following code snippet is vulnerable to this attack: + + <%= javascript_tag "var data = #{user_supplied_data.to_json};" %> + + Similarly, the following is also vulnerable: + + + + All applications that renders JSON-encoded strings that contains user-controlled + data in their views should either upgrade to one of the FIXED versions or use + the suggested workaround immediately. + + Workarounds + ----------- + To work around this problem add an initializer with the following code: + + module ActiveSupport + module JSON + module Encoding + private + class EscapedString + def to_s + self + end + end + end + end + end + unaffected_versions: + - "< 4.1.0" + patched_versions: + - ">= 4.2.2" + - "~> 4.1.11" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-3227.md b/advisories/_posts/2015-06-16-CVE-2015-3227.md new file mode 100644 index 00000000..c49fdcc4 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-3227.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2015-3227 (activesupport): Possible Denial of Service attack in Active + Support' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2015-3227 + ghsa: j96r-xvjq-r9pg + url: https://groups.google.com/forum/#!topic/rubyonrails-security/bahr2JLnxvk + title: Possible Denial of Service attack in Active Support + date: 2015-06-16 + description: | + Specially crafted XML documents can cause applications to raise a + `SystemStackError` and potentially cause a denial of service attack. This + only impacts applications using REXML or JDOM as their XML processor. Other + XML processors that Rails supports are not impacted. + + All users running an affected release should either upgrade or use one of the work arounds immediately. + + Workarounds + ----------- + Use an XML parser that is not impacted by this problem, such as Nokogiri or + LibXML. You can change the processor like this: + + ActiveSupport::XmlMini.backend = 'Nokogiri' + + If you cannot change XML parsers, then adjust + `RUBY_THREAD_MACHINE_STACK_SIZE`. + patched_versions: + - ">= 4.2.2" + - "~> 4.1.11" + - "~> 3.2.22" +--- diff --git a/advisories/_posts/2015-06-16-CVE-2015-4619.md b/advisories/_posts/2015-06-16-CVE-2015-4619.md new file mode 100644 index 00000000..8b3fe482 --- /dev/null +++ b/advisories/_posts/2015-06-16-CVE-2015-4619.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2015-4619 (spina): Cross-site request forgery (CSRF) vulnerability in + Spina gem' +comments: false +categories: +- spina +advisory: + gem: spina + cve: 2015-4619 + ghsa: 2hxv-mx8x-mcj9 + url: http://www.openwall.com/lists/oss-security/2015/06/16/11 + title: Cross-site request forgery (CSRF) vulnerability in Spina gem + date: 2015-06-16 + description: | + "`Spina::ApplicationController` actions didn't have CSRF protection. + This causes a CSRF vulnerability across the entire engine which includes administrative + functionality such as creating users, changing passwords, and media management." + cvss_v3: 8.8 + patched_versions: + - ">= 0.6.29" + related: + url: + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/cross-site-request-forgery-csrf/ruby/sid-1686/summary + - https://github.com/rubysec/ruby-advisory-db/issues/238 +--- diff --git a/advisories/_posts/2015-06-22-CVE-2015-5147.md b/advisories/_posts/2015-06-22-CVE-2015-5147.md new file mode 100644 index 00000000..14de4e1a --- /dev/null +++ b/advisories/_posts/2015-06-22-CVE-2015-5147.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2015-5147 (redcarpet): redcarpet Gem for Ruby html.c header_anchor() Function + Stack Overflow' +comments: false +categories: +- redcarpet +advisory: + gem: redcarpet + cve: 2015-5147 + osvdb: 123859 + ghsa: 7322-9mx6-5j2m + url: http://seclists.org/oss-sec/2015/q2/818 + title: redcarpet Gem for Ruby html.c header_anchor() Function Stack Overflow + date: 2015-06-22 + description: | + redcarpet Gem for Ruby contains a flaw that allows a stack overflow. + This flaw exists because the header_anchor() function in html.c uses + variable length arrays (VLA) without any range checking. This may + allow a remote attacker to execute arbitrary code. + cvss_v2: 7.5 + unaffected_versions: + - "< 3.3.0" + patched_versions: + - ">= 3.3.2" +--- diff --git a/advisories/_posts/2015-06-30-OSVDB-124383.md b/advisories/_posts/2015-06-30-OSVDB-124383.md new file mode 100644 index 00000000..46d0cfc9 --- /dev/null +++ b/advisories/_posts/2015-06-30-OSVDB-124383.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'OSVDB-124383 (ruby-saml): Ruby-Saml Gem is vulnerable to entity expansion + attacks' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + osvdb: 124383 + url: https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0 + title: Ruby-Saml Gem is vulnerable to entity expansion attacks + date: 2015-06-30 + description: 'ruby-saml before 1.0.0 is vulnerable to entity expansion attacks. + + ' + cvss_v2: 3.9 + patched_versions: + - ">= 1.0.0" + related: + url: + - https://github.com/SAML-Toolkits/ruby-saml/releases/tag/v1.0.0 + - https://github.com/SAML-Toolkits/ruby-saml/pull/247 + - https://security.snyk.io/vuln/SNYK-RUBY-RUBYSAML-20232 + - https://github.com/onelogin/ruby-saml/pull/247 +--- diff --git a/advisories/_posts/2015-07-06-OSVDB-125675.md b/advisories/_posts/2015-07-06-OSVDB-125675.md new file mode 100644 index 00000000..5f025de6 --- /dev/null +++ b/advisories/_posts/2015-07-06-OSVDB-125675.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'OSVDB-125675 (sidekiq): Sidekiq Gem for Ruby Multiple Unspecified CSRF' +comments: false +categories: +- sidekiq +advisory: + gem: sidekiq + osvdb: 125675 + url: https://seclists.org/oss-sec/2015/q3/267 + title: Sidekiq Gem for Ruby Multiple Unspecified CSRF + date: 2015-07-06 + description: 'Sidekiq::Web lacks CSRF protection + + ' + patched_versions: + - ">= 3.4.2" + related: + url: + - https://seclists.org/oss-sec/2015/q3/267 + - https://github.com/mperham/sidekiq/pull/2422 + - https://github.com/sidekiq/sidekiq/commit/cf3c43b2410c4573e05ac119494e41115f4140ad + - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQ-20233 +--- diff --git a/advisories/_posts/2015-07-13-CVE-2017-11173.md b/advisories/_posts/2015-07-13-CVE-2017-11173.md new file mode 100644 index 00000000..2e30997e --- /dev/null +++ b/advisories/_posts/2015-07-13-CVE-2017-11173.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2017-11173 (rack-cors): rack-cors Gem Missing Anchor permits unauthorized + CORS requests' +comments: false +categories: +- rack-cors +advisory: + gem: rack-cors + cve: 2017-11173 + ghsa: 2j9c-9vmv-7m39 + url: https://github.com/cyu/rack-cors/issues/86 + title: rack-cors Gem Missing Anchor permits unauthorized CORS requests + date: 2015-07-13 + description: | + Missing anchor in generated regex for rack-cors before 0.4.1 + allows a malicious third-party site to perform CORS requests. + If the configuration were intended to allow only the trusted + example.com domain name and not the malicious example.net domain name, + then example.com.example.net (as well as example.com-example.net) would + be inadvertently allowed. + cvss_v2: 6.8 + cvss_v3: 8.8 + patched_versions: + - ">= 0.4.1" + related: + url: + - https://github.com/cyu/rack-cors/issues/86 + - http://seclists.org/fulldisclosure/2017/Jul/22 +--- diff --git a/advisories/_posts/2015-07-17-OSVDB-126331.md b/advisories/_posts/2015-07-17-OSVDB-126331.md new file mode 100644 index 00000000..2546d521 --- /dev/null +++ b/advisories/_posts/2015-07-17-OSVDB-126331.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-126331 (sidekiq-pro): Sidekiq Pro Gem for Ruby CSRF in Job Filtering' +comments: false +categories: +- sidekiq-pro +advisory: + gem: sidekiq-pro + osvdb: 126331 + url: https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#206-193 + title: Sidekiq Pro Gem for Ruby CSRF in Job Filtering + date: 2015-07-17 + description: | + Sidekiq::Web job filtering lacks CSRF protection. + This issue is related to OSVDB-125675. + patched_versions: + - "~> 1.9.3" + - ">= 2.0.6" + related: + osvdb: + - 125675 + url: + - https://github.com/sidekiq/sidekiq/blob/main/Pro-Changes.md#206-193 + - https://github.com/sidekiq/sidekiq/issues/2442 + - https://github.com/sidekiq/sidekiq/issues/2467 + - https://github.com/rubysec/ruby-advisory-db/pull/201 + - https://security.snyk.io/vuln/SNYK-RUBY-SIDEKIQPRO-20234 +--- diff --git a/advisories/_posts/2015-07-20-OSVDB-125701.md b/advisories/_posts/2015-07-20-OSVDB-125701.md new file mode 100644 index 00000000..8884d8a4 --- /dev/null +++ b/advisories/_posts/2015-07-20-OSVDB-125701.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-125701 (spree): Spree RABL templates rendering allows Arbitrary Code + Execution and File Disclosure' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 125701 + url: https://web.archive.org/web/20160331140223/https://spreecommerce.com/blog/security-updates-2015-7-20 + title: Spree RABL templates rendering allows Arbitrary Code Execution and File Disclosure + date: 2015-07-20 + description: | + Spree contains a flaw where the rendering of arbitrary RABL templates + allows for execution arbitrary files on the host system, as well as + disclosing the existence of files on the system. + patched_versions: + - "~> 2.2.12" + - "~> 2.3.11" + - "~> 2.4.8" + - ">= 3.0.2" + related: + url: + - https://web.archive.org/web/20160331140223/https://spreecommerce.com/blog/security-updates-2015-7-20 + - https://github.com/rubysec/bundler-audit/issues/106 +--- diff --git a/advisories/_posts/2015-07-21-CVE-2015-5378.md b/advisories/_posts/2015-07-21-CVE-2015-5378.md new file mode 100644 index 00000000..dbb93642 --- /dev/null +++ b/advisories/_posts/2015-07-21-CVE-2015-5378.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2015-5378 (logstash-core): Logstash: SSL/TLS FREAK Attack' +comments: false +categories: +- logstash-core +advisory: + gem: logstash-core + cve: 2015-5378 + ghsa: g6rc-3fpq-w2gr + url: https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html + title: 'Logstash: SSL/TLS FREAK Attack' + date: 2015-07-21 + description: | + Logstash: SSL/TLS FREAK Attack: Logstash 1.5.x before 1.5.3 and + 1.4.x before 1.4.4 allows remote attackers to read communications + between Logstash Forwarder agent and Logstash server. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - "~> 1.4.4" + - ">= 1.5.3" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-5378 + - https://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/factoring-attack-rsa-export-keys-freak/ruby/sid-1745/summary + - https://github.com/rubysec/ruby-advisory-db/issues/238 + - https://www.elastic.co/community/security + - https://github.com/advisories/GHSA-g6rc-3fpq-w2gr + - https://web.archive.org/web/20181211080524/http://www.securityfocus.com/bid/76015 +--- diff --git a/advisories/_posts/2015-07-21-CVE-2015-8857.md b/advisories/_posts/2015-07-21-CVE-2015-8857.md new file mode 100644 index 00000000..ea14f5d0 --- /dev/null +++ b/advisories/_posts/2015-07-21-CVE-2015-8857.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2015-8857 (uglifier): uglifier incorrectly handles non-boolean comparisons + during minification' +comments: false +categories: +- uglifier +advisory: + gem: uglifier + cve: 2015-8857 + osvdb: 126747 + ghsa: 34r7-q49f-h37c + url: https://github.com/mishoo/UglifyJS2/issues/751 + title: uglifier incorrectly handles non-boolean comparisons during minification + date: 2015-07-21 + description: | + The upstream library for the Ruby uglifier gem, UglifyJS, is + affected by a vulnerability that allows a specially crafted + Javascript file to have altered functionality after minification. + + This bug, found in UglifyJS versions 2.4.23 and earlier, was demonstrated + to allow potentially malicious code to be hidden within secure code, + and activated by the minification process. + + For more information, consult: + * https://zyan.scripts.mit.edu/blog/backdooring-js + + * CWE: 254 - 7PK - Security Features + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 2.7.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-8857 + - https://github.com/mishoo/UglifyJS/issues/751 + - https://blog.azuki.vip/backdooring-js + - https://www.openwall.com/lists/oss-security/2016/04/20/11 + - https://github.com/advisories/GHSA-34r7-q49f-h37c +--- diff --git a/advisories/_posts/2015-07-21-OSVDB-126747.md b/advisories/_posts/2015-07-21-OSVDB-126747.md new file mode 100644 index 00000000..e871891a --- /dev/null +++ b/advisories/_posts/2015-07-21-OSVDB-126747.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'OSVDB-126747 (uglifier): uglifier incorrectly handles non-boolean comparisons + during minification' +comments: false +categories: +- uglifier +advisory: + gem: uglifier + osvdb: 126747 + url: https://github.com/mishoo/UglifyJS2/issues/751 + title: uglifier incorrectly handles non-boolean comparisons during minification + date: 2015-07-21 + description: |2 + + The upstream library for the Ruby uglifier gem, UglifyJS, is + affected by a vulnerability that allows a specially crafted + Javascript file to have altered functionality after minification. + + This bug, found in UglifyJS versions 2.4.23 and earlier, was demonstrated + to allow potentially malicious code to be hidden within secure code, + and activated by the minification process. + + For more information, consult: https://zyan.scripts.mit.edu/blog/backdooring-js/ + patched_versions: + - ">= 2.7.2" +--- diff --git a/advisories/_posts/2015-07-28-OSVDB-125699.md b/advisories/_posts/2015-07-28-OSVDB-125699.md new file mode 100644 index 00000000..f72cad19 --- /dev/null +++ b/advisories/_posts/2015-07-28-OSVDB-125699.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'OSVDB-125699 (spree): Spree RABL templates rendering allows Arbitrary Code + Execution and File Disclosure' +comments: false +categories: +- spree +advisory: + gem: spree + osvdb: 125699 + url: https://web.archive.org/web/20160331133641/spreecommerce.com/blog/security-updates-2015-7-28 + title: Spree RABL templates rendering allows Arbitrary Code Execution and File Disclosure + date: 2015-07-28 + description: | + Spree contains a flaw where the rendering of arbitrary RABL templates + allows for execution arbitrary files on the host system, as well as + disclosing the existence of files on the system. + This is a different issue than OSVDB-125701. + patched_versions: + - "~> 2.2.13" + - "~> 2.3.12" + - "~> 2.4.9" + - ">= 3.0.3" + related: + osvdb: + - 125701 + url: + - https://github.com/rubysec/bundler-audit/issues/106 + - https://security.snyk.io/vuln/SNYK-RUBY-SPREE-20237 +--- diff --git a/advisories/_posts/2015-08-20-CVE-2015-5619.md b/advisories/_posts/2015-08-20-CVE-2015-5619.md new file mode 100644 index 00000000..183a649d --- /dev/null +++ b/advisories/_posts/2015-08-20-CVE-2015-5619.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2015-5619 (logstash-core): Logstash: Man-In-The Middle attack' +comments: false +categories: +- logstash-core +advisory: + gem: logstash-core + cve: 2015-5619 + ghsa: 68pf-743m-hv2w + url: https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released + title: 'Logstash: Man-In-The Middle attack' + date: 2015-08-20 + description: | + Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack + output or the Logstash forwarder does not validate SSL/TLS certificates + from the Logstash server, which might allow attackers to obtain + sensitive information via a man-in-the-middle attack. + cvss_v2: 4.3 + cvss_v3: 5.9 + patched_versions: + - "~> 1.4.5" + - ">= 1.5.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-5619 + - https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released + - https://www.elastic.co/community/security + - https://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/man-middle-mitm-attacks/ruby/sid-1798/summary + - https://github.com/advisories/GHSA-68pf-743m-hv2w +--- diff --git a/advisories/_posts/2015-08-24-OSVDB-131671.md b/advisories/_posts/2015-08-24-OSVDB-131671.md new file mode 100644 index 00000000..b645be2b --- /dev/null +++ b/advisories/_posts/2015-08-24-OSVDB-131671.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'OSVDB-131671 (handlebars-source): handlebars.js - quoteless attributes in + templates can lead to XSS' +comments: false +categories: +- handlebars-source +advisory: + gem: handlebars-source + osvdb: 131671 + url: https://security.snyk.io/vuln/SNYK-RUBY-HANDLEBARSSOURCE-20238 + title: handlebars.js - quoteless attributes in templates can lead to XSS + date: 2015-08-24 + description: | + The upstream 'handlebars' node.js module was found to not properly + escape equals (=) signs, leading to possible content injection + via attributes in templates. + + Example: + * Template: + * Input: { 'foo' : 'test.com onload=alert(1)'} + * Rendered result: + patched_versions: + - ">= 4.0.0" + related: + ghsa: + - 9prh-257w-9277 + url: + - https://github.com/handlebars-lang/handlebars.js + - https://github.com/handlebars-lang/handlebars.js/compare/v3.0.8...v4.0.0 + - https://security.snyk.io/vuln/SNYK-RUBY-HANDLEBARSSOURCE-20238 + - https://github.com/rubysec/bundler-audit/issues/185 + - https://www.veracode.com/blog/research/handlebarsjs-vulnerability-impact-study +--- diff --git a/advisories/_posts/2015-09-17-CVE-2015-7225.md b/advisories/_posts/2015-09-17-CVE-2015-7225.md new file mode 100644 index 00000000..7eac9687 --- /dev/null +++ b/advisories/_posts/2015-09-17-CVE-2015-7225.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2015-7225 (devise-two-factor): devise-two-factor 1.1.0 and earlier vulnerable + to replay attacks' +comments: false +categories: +- devise-two-factor +advisory: + gem: devise-two-factor + cve: 2015-7225 + ghsa: x489-jjwm-52g7 + url: http://www.openwall.com/lists/oss-security/2015/09/06/2 + title: devise-two-factor 1.1.0 and earlier vulnerable to replay attacks + date: 2015-09-17 + description: | + A OTP replay vulnerability in devise-two-factor 1.1.0 and earlier allows local + attackers to shoulder-surf a user's TOTP verification code and use it to + login after the user has authenticated. + + By not "burning" a previously used TOTP, devise-two-factor allows a narrow + window of opportunity (aka the timestep period) where an attacker can re-use a + verification code. + + Should an attacker possess a given user's authentication + credentials, this flaw effectively defeats two-factor authentication for the + duration of the timestep. + cvss_v3: 5.3 + patched_versions: + - ">= 2.0.0" +--- diff --git a/advisories/_posts/2015-09-20-CVE-2015-7314.md b/advisories/_posts/2015-09-20-CVE-2015-7314.md new file mode 100644 index 00000000..0f373ec0 --- /dev/null +++ b/advisories/_posts/2015-09-20-CVE-2015-7314.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2015-7314 (gollum): gollum Upload File Functionality Permits Arbitrary + File Access' +comments: false +categories: +- gollum +advisory: + gem: gollum + cve: 2015-7314 + osvdb: 127779 + ghsa: m2q3-53fq-7h66 + url: https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1 + title: gollum Upload File Functionality Permits Arbitrary File Access + date: 2015-09-20 + description: | + The gollum gem contains a flaw in its upload file functionality that can + allow arbitrary file access. This occurs due to a lack of type checking + when handling temporary files during the upload process. + patched_versions: + - ">= 4.0.1" +--- diff --git a/advisories/_posts/2015-10-24-CVE-2017-1000042.md b/advisories/_posts/2015-10-24-CVE-2017-1000042.md new file mode 100644 index 00000000..d58a7ae3 --- /dev/null +++ b/advisories/_posts/2015-10-24-CVE-2017-1000042.md @@ -0,0 +1,44 @@ +--- +layout: advisory +title: 'CVE-2017-1000042 (mapbox-rails): mapbox-rails Content Injection via TileJSON + attribute' +comments: false +categories: +- mapbox-rails +advisory: + gem: mapbox-rails + cve: 2017-1000042 + osvdb: 129854 + ghsa: qr28-7j6p-9hmv + url: https://nvd.nist.gov/vuln/detail/CVE-2017-1000042 + title: mapbox-rails Content Injection via TileJSON attribute + date: 2015-10-24 + description: | + Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable + to a cross-site-scripting attack in certain uncommon usage scenarios. + + If you use L.mapbox.map or L.mapbox.tileLayer to load untrusted TileJSON + content from a non-Mapbox URL, it is possible for a malicious user with + control over the TileJSON content to inject script content into the + "attribution" value of the TileJSON which will be executed in the context of + the page using Mapbox.js. + + Such usage is uncommon. The following usage scenarios are not vulnerable: + + * only trusted TileJSON content is loaded + * TileJSON content comes only from mapbox.com URLs + * a Mapbox map ID is supplied, rather than a TileJSON URL + + * CWE: 79 - Improper Neutralization of Input During Web Page Generation (XSS) + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - "~> 1.6.5" + - ">= 2.1.7" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2017-1000042 + - https://nodesecurity.io/advisories/49 + - https://hackerone.com/reports/54327 + - https://github.com/advisories/GHSA-qr28-7j6p-9hmv +--- diff --git a/advisories/_posts/2015-10-24-OSVDB-129854.md b/advisories/_posts/2015-10-24-OSVDB-129854.md new file mode 100644 index 00000000..6bd7ec07 --- /dev/null +++ b/advisories/_posts/2015-10-24-OSVDB-129854.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'OSVDB-129854 (mapbox-rails): mapbox-rails Content Injection via TileJSON attribute' +comments: false +categories: +- mapbox-rails +advisory: + gem: mapbox-rails + osvdb: 129854 + url: https://nodesecurity.io/advisories/49 + title: mapbox-rails Content Injection via TileJSON attribute + date: 2015-10-24 + description: | + Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable + to a cross-site-scripting attack in certain uncommon usage scenarios. + + If you use L.mapbox.map or L.mapbox.tileLayer to load untrusted TileJSON + content from a non-Mapbox URL, it is possible for a malicious user with + control over the TileJSON content to inject script content into the + "attribution" value of the TileJSON which will be executed in the context of + the page using Mapbox.js. + + Such usage is uncommon. The following usage scenarios are not vulnerable: + + * only trusted TileJSON content is loaded + * TileJSON content comes only from mapbox.com URLs + * a Mapbox map ID is supplied, rather than a TileJSON URL + patched_versions: + - "~> 1.6.5" + - ">= 2.1.7" +--- diff --git a/advisories/_posts/2015-11-17-OSVDB-131671.md b/advisories/_posts/2015-11-17-OSVDB-131671.md new file mode 100644 index 00000000..83e0ee63 --- /dev/null +++ b/advisories/_posts/2015-11-17-OSVDB-131671.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'OSVDB-131671 (mustache-js-rails): mustache.js - quoteless attributes in templates + can lead to XSS' +comments: false +categories: +- mustache-js-rails +advisory: + gem: mustache-js-rails + osvdb: 131671 + url: https://security.snyk.io/vuln/SNYK-RUBY-MUSTACHEJSRAILS-20242 + title: mustache.js - quoteless attributes in templates can lead to XSS + date: 2015-11-17 + description: | + The upstream 'mustache.js' node.js module was found to not properly + escape backtick (`) and equals (=) characters, leading to possible + content injection via attributes in templates. + + Example: + * Template: + * Input: { 'foo' : 'test.com onload=alert(1)'} + * Rendered result: + patched_versions: + - ">= 2.0.3" + related: + ghsa: + - w3w8-37jv-2c58 + url: + - https://github.com/janl/mustache.js/pull/530 + - https://security.snyk.io/vuln/SNYK-RUBY-MUSTACHEJSRAILS-20242 + - https://www.veracode.com/blog/research/handlebarsjs-vulnerability-impact-study +--- diff --git a/advisories/_posts/2015-11-23-CVE-2015-7519.md b/advisories/_posts/2015-11-23-CVE-2015-7519.md new file mode 100644 index 00000000..2b901de0 --- /dev/null +++ b/advisories/_posts/2015-11-23-CVE-2015-7519.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2015-7519 (passenger): Phusion Passenger Server allows to overwrite headers + in some cases' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2015-7519 + ghsa: fxwv-953p-7qpf + url: https://blog.phusion.nl/2015/12/07/cve-2015-7519/ + title: Phusion Passenger Server allows to overwrite headers in some cases + date: 2015-11-23 + description: | + It is possible in some cases, for clients to overwrite headers set by + the server, resulting in a medium level security issue. Passenger 5 uses an SCGI-inspired + format to pass headers to Ruby/Python applications, while Passenger 4 uses an SCGI-inspired + format to pass headers to all applications. This implies a conversion to UPPER_CASE_WITH_UNDERSCORES + whereby the difference between characters like '-' and '_' is lost. + cvss_v3: 3.7 + patched_versions: + - "~> 4.0.60" + - ">= 5.0.22" +--- diff --git a/advisories/_posts/2015-12-09-CVE-2015-9097.md b/advisories/_posts/2015-12-09-CVE-2015-9097.md new file mode 100644 index 00000000..bfd90de8 --- /dev/null +++ b/advisories/_posts/2015-12-09-CVE-2015-9097.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2015-9097 (mail): CVE-2015-9097 rubygem-mail: SMTP injection via recipient + email addresses' +comments: false +categories: +- mail +advisory: + gem: mail + cve: 2015-9097 + osvdb: 131677 + ghsa: q86f-fmqf-qrf6 + url: https://hackerone.com/reports/137631 + title: 'CVE-2015-9097 rubygem-mail: SMTP injection via recipient email addresses' + date: 2015-12-09 + description: | + The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is + vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM + command, as demonstrated by CRLF sequences immediately before and after a DATA substring. + cvss_v3: 6.1 + patched_versions: + - ">= 2.5.5" + related: + url: + - http://www.mbsd.jp/Whitepaper/smtpi.pdf + - https://github.com/mikel/mail/pull/1097 +--- diff --git a/advisories/_posts/2015-12-11-CVE-2015-8968.md b/advisories/_posts/2015-12-11-CVE-2015-8968.md new file mode 100644 index 00000000..466e1b36 --- /dev/null +++ b/advisories/_posts/2015-12-11-CVE-2015-8968.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2015-8968 (git-fastclone): git-fastclone permits arbitrary shell command + execution from .gitmodules' +comments: false +categories: +- git-fastclone +advisory: + gem: git-fastclone + cve: 2015-8968 + ghsa: 8gg6-3r63-25m8 + url: https://hackerone.com/reports/104465 + title: git-fastclone permits arbitrary shell command execution from .gitmodules + date: 2015-12-11 + description: | + Git allows executing arbitrary shell commands using git-remote-ext via a + remote URLs. Normally git never requests URLs that the user doesn't + specifically request, so this is not a serious security concern. However, + submodules did allow the remote repository to specify what URL to clone + from. + + If an attacker can instruct a user to run a recursive clone from a + repository they control, they can get a client to run an arbitrary shell + command. Alternately, if an attacker can MITM an unencrypted git clone, + they could exploit this. The ext command will be run if the repository is + recursively cloned or if submodules are updated. This attack works when + cloning both local and remote repositories. + cvss_v3: 8.8 + patched_versions: + - ">= 1.0.1" +--- diff --git a/advisories/_posts/2015-12-15-CVE-2015-5312.md b/advisories/_posts/2015-12-15-CVE-2015-5312.md new file mode 100644 index 00000000..00ae60ce --- /dev/null +++ b/advisories/_posts/2015-12-15-CVE-2015-5312.md @@ -0,0 +1,96 @@ +--- +layout: advisory +title: 'CVE-2015-5312 (nokogiri): Nokogiri gem contains several vulnerabilities in + libxml2' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2015-5312 + ghsa: xjqg-9jvg-fgx2 + url: https://groups.google.com/forum/#!topic/ruby-security-ann/aSbgDiwb24s + title: Nokogiri gem contains several vulnerabilities in libxml2 + date: 2015-12-15 + description: | + Nokogiri version 1.6.7.1 has been released, pulling in several upstream + patches to the vendored libxml2 to address the following CVEs: + + CVE-2015-5312 + CVSS v2 Base Score: 7.1 (HIGH) + The xmlStringLenDecodeEntities function in parser.c in libxml2 + before 2.9.3 does not properly prevent entity expansion, which + allows context-dependent attackers to cause a denial of + service (CPU consumption) via crafted XML data, a different + vulnerability than CVE-2014-3660. + + CVE-2015-7497 + CVSS v2 Base Score: 5.0 (MEDIUM) + Heap-based buffer overflow in the xmlDictComputeFastQKey + function in dict.c in libxml2 before 2.9.3 allows + context-dependent attackers to cause a denial of service via + unspecified vectors. + + CVE-2015-7498 + CVSS v2 Base Score: 5.0 (MEDIUM) + Heap-based buffer overflow in the xmlParseXmlDecl function in + parser.c in libxml2 before 2.9.3 allows context-dependent + attackers to cause a denial of service via unspecified vectors + related to extracting errors after an encoding conversion + failure. + + CVE-2015-7499 + CVSS v2 Base Score: 5.0 (MEDIUM) + Heap-based buffer overflow in the xmlGROW function in parser.c + in libxml2 before 2.9.3 allows context-dependent attackers to + obtain sensitive process memory information via unspecified + vectors. + + CVE-2015-7500 + CVSS v2 Base Score: 5.0 (MEDIUM) + The xmlParseMisc function in parser.c in libxml2 before 2.9.3 + allows context-dependent attackers to cause a denial of + service (out-of-bounds heap read) via unspecified vectors + related to incorrect entities boundaries and start tags. + + CVE-2015-8241 + CVSS v2 Base Score: 6.4 (MEDIUM) + The xmlNextChar function in libxml2 2.9.2 does not properly + check the state, which allows context-dependent attackers to + cause a denial of service (heap-based buffer over-read and + application crash) or obtain sensitive information via crafted + XML data. + + CVE-2015-8242 + CVSS v2 Base Score: 5.8 (MEDIUM) + The xmlSAX2TextNode function in SAX2.c in the push interface in + the HTML parser in libxml2 before 2.9.3 allows + context-dependent attackers to cause a denial of + service (stack-based buffer over-read and application crash) or + obtain sensitive information via crafted XML data. + + CVE-2015-8317 + CVSS v2 Base Score: 5.0 (MEDIUM) + The xmlParseXMLDecl function in parser.c in libxml2 before + 2.9.3 allows context-dependent attackers to obtain sensitive + information via an (1) unterminated encoding value or (2) + incomplete XML declaration in XML data, which triggers an + out-of-bounds heap read. + cvss_v2: 7.1 + unaffected_versions: + - "< 1.6.0" + patched_versions: + - ">= 1.6.7.1" + related: + cve: + - 2015-7497 + - 2015-7498 + - 2015-7499 + - 2015-7500 + - 2015-8241 + - 2015-8242 + - 2015-8317 + url: + - https://github.com/sparklemotion/nokogiri/pull/1378 + - https://github.com/sparklemotion/nokogiri/commit/4205af1a2a546f79d1b48df2ad8b27299c0099c5 +--- diff --git a/advisories/_posts/2015-12-15-CVE-2015-8969.md b/advisories/_posts/2015-12-15-CVE-2015-8969.md new file mode 100644 index 00000000..11e19900 --- /dev/null +++ b/advisories/_posts/2015-12-15-CVE-2015-8969.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2015-8969 (git-fastclone): git-fastclone Shell Metacharacter Injection + Arbitrary Command Execution' +comments: false +categories: +- git-fastclone +advisory: + gem: git-fastclone + cve: 2015-8969 + ghsa: mf6w-45cf-qhmp + url: https://hackerone.com/reports/105190 + title: git-fastclone Shell Metacharacter Injection Arbitrary Command Execution + date: 2015-12-15 + description: | + git-fastclone before 1.0.5 passes user modifiable strings directly to a shell + command. An attacker can execute malicious commands by modifying the strings + that are passed as arguments to "cd " and "git clone " commands in the + library. + cvss_v3: 9.8 + patched_versions: + - ">= 1.0.5" +--- diff --git a/advisories/_posts/2015-12-18-OSVDB-132234.md b/advisories/_posts/2015-12-18-OSVDB-132234.md new file mode 100644 index 00000000..e1ee2e85 --- /dev/null +++ b/advisories/_posts/2015-12-18-OSVDB-132234.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'OSVDB-132234 (rack-attack): rack-attack Gem for Ruby missing normalization + before request path processing' +comments: false +categories: +- rack-attack +advisory: + gem: rack-attack + osvdb: 132234 + url: https://github.com/kickstarter/rack-attack/releases/tag/v4.3.1 + title: rack-attack Gem for Ruby missing normalization before request path processing + date: 2015-12-18 + description: | + When using rack-attack with a rails app, developers expect the request + path to be normalized. In particular, trailing slashes are stripped so + a request path "/login/" becomes "/login" by the time you're in + ActionController. + + Since Rack::Attack runs before ActionDispatch, the request path is not + yet normalized. This can cause throttles and blacklists to not work as + expected. + + E.g., a throttle: + + `throttle('logins', ...) {|req| req.path == "/login" }` + + would not match a request to '/login/', though Rails would route + '/login/' to the same '/login' action. + patched_versions: + - ">= 4.3.1" + related: + url: + - https://github.com/kickstarter/rack-attack/releases/tag/v4.3.1 + - https://github.com/rack/rack-attack/commit/76c2e3143099d938883ae5654527b47e9e6a8977 + - https://security.snyk.io/vuln/SNYK-RUBY-RACKATTACK-20246 + - https://github.com/rack/rack-attack/blob/main/CHANGELOG.md +--- diff --git a/advisories/_posts/2016-01-04-CVE-2015-7541.md b/advisories/_posts/2016-01-04-CVE-2015-7541.md new file mode 100644 index 00000000..e2290ad2 --- /dev/null +++ b/advisories/_posts/2016-01-04-CVE-2015-7541.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2015-7541 (colorscore): colorscore Gem for Ruby lib/colorscore/histogram.rb + Arbitrary Command Injection' +comments: false +categories: +- colorscore +advisory: + gem: colorscore + cve: 2015-7541 + osvdb: 132516 + ghsa: 73qw-ww62-m54x + url: http://seclists.org/oss-sec/2016/q1/17 + title: colorscore Gem for Ruby lib/colorscore/histogram.rb Arbitrary Command Injection + date: 2016-01-04 + description: | + The contents of the `image_path`, `colors`, and `depth` variables generated + from possibly user-supplied input are passed directly to the shell via + `convert ...`. + + If a user supplies a value that includes shell metacharacters such as ';', an + attacker may be able to execute shell commands on the remote system as the + user id of the Ruby process. + + To resolve this issue, the aforementioned variables (especially `image_path`) + must be sanitized for shell metacharacters. + cvss_v3: 10.0 + patched_versions: + - ">= 0.0.5" +--- diff --git a/advisories/_posts/2016-01-08-OSVDB-132800.md b/advisories/_posts/2016-01-08-OSVDB-132800.md new file mode 100644 index 00000000..3c84d5b6 --- /dev/null +++ b/advisories/_posts/2016-01-08-OSVDB-132800.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'OSVDB-132800 (auto_select2): auto_select2 Gem for Ruby allows arbitrary search + execution' +comments: false +categories: +- auto_select2 +advisory: + gem: auto_select2 + osvdb: 132800 + url: https://www.openwall.com/lists/oss-security/2016/01/11/2 + title: auto_select2 Gem for Ruby allows arbitrary search execution + date: 2016-01-08 + description: | + auto_select2 Gem for Ruby contains a flaw that is triggered + when handling the 'params[:default_class_name]' option. This + allows users to search any object of all given ActiveRecord classes. + patched_versions: + - ">= 0.5.0" + related: + url: + - https://www.openwall.com/lists/oss-security/2016/01/11/2 + - https://github.com/Loriowar/auto_select2/issues/4 + - https://github.com/bkocherov/auto_select2/commit/c283ba5b2ad828c3b7414565ae66cd0d86f5a5df + - https://github.com/rubysec/ruby-advisory-db/issues/224 + - https://github.com/rubysec/ruby-advisory-db/pull/227 + - https://github.com/Tab10id/auto_awesomplete/issues/2 +--- diff --git a/advisories/_posts/2016-01-12-CVE-2017-1000043.md b/advisories/_posts/2016-01-12-CVE-2017-1000043.md new file mode 100644 index 00000000..79c4e866 --- /dev/null +++ b/advisories/_posts/2016-01-12-CVE-2017-1000043.md @@ -0,0 +1,43 @@ +--- +layout: advisory +title: 'CVE-2017-1000043 (mapbox-rails): mapbox-rails Content Injection via TileJSON + Name' +comments: false +categories: +- mapbox-rails +advisory: + gem: mapbox-rails + cve: 2017-1000043 + osvdb: 132871 + ghsa: q69p-5h74-w36f + url: https://nvd.nist.gov/vuln/detail/CVE-2017-1000043 + title: mapbox-rails Content Injection via TileJSON Name + date: 2016-01-12 + description: | + Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable + to a cross-site-scripting attack in certain uncommon usage scenarios. + + If you use L.mapbox.map and L.mapbox.shareControl it is possible for a + malicious user with control over the TileJSON content to inject script + content into the name value of the TileJSON. After clicking on the share + control, the malicious code will execute in the context of the page using + Mapbox.js. + + Such usage is uncommon. L.mapbox.shareControl is not automatically added to + Mapbox.js maps and must be explicitly added. The following usage scenarios + are not vulnerable: + + * the map does not use a share control (L.mapbox.sharecontrol) + * only trusted TileJSON content is loaded + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - "~> 1.6.6" + - ">= 2.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2017-1000043 + - https://nodesecurity.io/advisories/74 + - https://hackerone.com/reports/99245 + - https://github.com/advisories/GHSA-q69p-5h74-w36f +--- diff --git a/advisories/_posts/2016-01-12-OSVDB-132871.md b/advisories/_posts/2016-01-12-OSVDB-132871.md new file mode 100644 index 00000000..245c51e0 --- /dev/null +++ b/advisories/_posts/2016-01-12-OSVDB-132871.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'OSVDB-132871 (mapbox-rails): mapbox-rails Content Injection via TileJSON Name' +comments: false +categories: +- mapbox-rails +advisory: + gem: mapbox-rails + osvdb: 132871 + url: https://nodesecurity.io/advisories/74 + title: mapbox-rails Content Injection via TileJSON Name + date: 2016-01-12 + description: | + Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable + to a cross-site-scripting attack in certain uncommon usage scenarios. + + If you use L.mapbox.map and L.mapbox.shareControl it is possible for a + malicious user with control over the TileJSON content to inject script + content into the name value of the TileJSON. After clicking on the share + control, the malicious code will execute in the context of the page using + Mapbox.js. + + Such usage is uncommon. L.mapbox.shareControl is not automatically added to + Mapbox.js maps and must be explicitly added. The following usage scenarios + are not vulnerable: + + * the map does not use a share control (L.mapbox.sharecontrol) + * only trusted TileJSON content is loaded + patched_versions: + - "~> 1.6.6" + - ">= 2.2.4" +--- diff --git a/advisories/_posts/2016-01-14-CVE-2015-7565.md b/advisories/_posts/2016-01-14-CVE-2015-7565.md new file mode 100644 index 00000000..6d48a0ce --- /dev/null +++ b/advisories/_posts/2016-01-14-CVE-2015-7565.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2015-7565 (ember-source): Ember.js XSS Vulnerability with User-Supplied + JSON' +comments: false +categories: +- ember-source +advisory: + gem: ember-source + cve: 2015-7565 + ghsa: m3q7-rj8g-m457 + url: https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY + title: Ember.js XSS Vulnerability with User-Supplied JSON + date: 2016-01-14 + description: | + By default, Ember will escape any values in Handlebars templates that + use double curlies (`{{value}}`). Developers can specifically opt out of + this escaping behavior by passing an instance of `SafeString` rather + than a raw string, which tells Ember that it should not escape the + string because the developer has taken responsibility for escapement. + + It is possible for an attacker to create a specially-crafted payload + that causes a non-sanitized string to be treated as a `SafeString`, and + thus bypass Ember's normal escaping behavior. This could allow an + attacker to execute arbitrary JavaScript in the context of the current + domain ("XSS"). + + All users running an affected release should either upgrade or use of + the workarounds immediately. + cvss_v3: 6.1 + unaffected_versions: + - "< 1.8.0" + patched_versions: + - "~> 1.11.4" + - "~> 1.12.2" + - "~> 1.13.12" + - "~> 2.0.3" + - "~> 2.1.2" + - ">= 2.2.1" +--- diff --git a/advisories/_posts/2016-01-18-CVE-2015-8314.md b/advisories/_posts/2016-01-18-CVE-2015-8314.md new file mode 100644 index 00000000..28d5c359 --- /dev/null +++ b/advisories/_posts/2016-01-18-CVE-2015-8314.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2015-8314 (devise): Devise Gem for Ruby Unauthorized Access Using Remember + Me Cookie' +comments: false +categories: +- devise +advisory: + gem: devise + cve: 2015-8314 + ghsa: 746g-3gfp-hfhw + url: http://blog.plataformatec.com.br/2016/01/improve-remember-me-cookie-expiration-in-devise/ + title: Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie + date: 2016-01-18 + description: | + Devise version before 3.5.4 uses cookies to implement a "Remember me" + functionality. However, it generates the same cookie for all devices. If an + attacker manages to steal a remember me cookie and the user does not change + the password frequently, the cookie can be used to gain access to the + application indefinitely. + cvss_v3: 7.5 + patched_versions: + - ">= 3.5.4" +--- diff --git a/advisories/_posts/2016-01-19-CVE-2015-7499.md b/advisories/_posts/2016-01-19-CVE-2015-7499.md new file mode 100644 index 00000000..bc060a2b --- /dev/null +++ b/advisories/_posts/2016-01-19-CVE-2015-7499.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2015-7499 (nokogiri): Nokogiri gem contains a heap-based buffer overflow + vulnerability in libxml2' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2015-7499 + ghsa: jxjr-5h69-qw3w + url: https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM + title: Nokogiri gem contains a heap-based buffer overflow vulnerability in libxml2 + date: 2016-01-19 + description: | + Nokogiri version 1.6.7.2 has been released, pulling in several upstream + patches to the vendored libxml2 to address the following CVE: + + CVE-2015-7499 + CVSS v2 Base Score: 5.0 (MEDIUM) + + Heap-based buffer overflow in the xmlGROW function in parser.c + in libxml2 before 2.9.3 allows context-dependent attackers to + obtain sensitive process memory information via unspecified + vectors. + + libxml2 could be made to crash if it opened a specially crafted + file. It was discovered that libxml2 incorrectly handled certain + malformed documents. If a user or automated system were tricked + into opening a specially crafted document, an attacker could + possibly cause libxml2 to crash, resulting in a denial of service. + cvss_v2: 5.0 + unaffected_versions: + - "< 1.6.0" + patched_versions: + - ">= 1.6.7.2" + related: + url: + - https://github.com/sparklemotion/nokogiri/commit/9eb540e7c905924a42757bf0a34c2c00707d536c +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7576.md b/advisories/_posts/2016-01-25-CVE-2015-7576.md new file mode 100644 index 00000000..92d721f5 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7576.md @@ -0,0 +1,125 @@ +--- +layout: advisory +title: 'CVE-2015-7576 (actionpack): Timing attack vulnerability in basic authentication + in Action Controller.' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2015-7576 + ghsa: p692-7mm3-3fxg + url: https://groups.google.com/forum/#!topic/rubyonrails-security/ANv0HDHEC3k + title: Timing attack vulnerability in basic authentication in Action Controller. + date: 2016-01-25 + description: | + There is a timing attack vulnerability in the basic authentication support + in Action Controller. This vulnerability has been assigned the CVE + identifier CVE-2015-7576. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1 + + Impact + ------ + Due to the way that Action Controller compares user names and passwords in + basic authentication authorization code, it is possible for an attacker to + analyze the time taken by a response and intuit the password. + + For example, this string comparison: + + "foo" == "bar" + + is possibly faster than this comparison: + + "foo" == "fo1" + + Attackers can use this information to attempt to guess the username and + password used in the basic authentication system. + + You can tell you application is vulnerable to this attack by looking for + `http_basic_authenticate_with` method calls in your application. + + All users running an affected release should either upgrade or use one of + the workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + If you can't upgrade, please use the following monkey patch in an initializer + that is loaded before your application: + + ``` + $ cat config/initializers/basic_auth_fix.rb + module ActiveSupport + module SecurityUtils + def secure_compare(a, b) + return false unless a.bytesize == b.bytesize + + l = a.unpack "C#{a.bytesize}" + + res = 0 + b.each_byte { |byte| res |= byte ^ l.shift } + res == 0 + end + module_function :secure_compare + + def variable_size_secure_compare(a, b) + secure_compare(::Digest::SHA256.hexdigest(a), ::Digest::SHA256.hexdigest(b)) + end + module_function :variable_size_secure_compare + end + end + + module ActionController + class Base + def self.http_basic_authenticate_with(options = {}) + before_action(options.except(:name, :password, :realm)) do + authenticate_or_request_with_http_basic(options[:realm] || "Application") do |name, password| + # This comparison uses & so that it doesn't short circuit and + # uses `variable_size_secure_compare` so that length information + # isn't leaked. + ActiveSupport::SecurityUtils.variable_size_secure_compare(name, options[:name]) & + ActiveSupport::SecurityUtils.variable_size_secure_compare(password, options[:password]) + end + end + end + end + end + ``` + + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 4-1-basic_auth.patch - Patch for 4.1 series + * 4-2-basic_auth.patch - Patch for 4.2 series + * 5-0-basic_auth.patch - Patch for 5.0 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users + of earlier unsupported releases are advised to upgrade as soon as possible as we + cannot guarantee the continued availability of security fixes for unsupported + releases. + + Credits + ------- + + Thank you to Daniel Waterworth for reporting the problem and working with us to + fix it. + cvss_v2: 4.3 + cvss_v3: 3.7 + patched_versions: + - ">= 5.0.0.beta1.1" + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" + - "~> 3.2.22.1" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7577.md b/advisories/_posts/2016-01-25-CVE-2015-7577.md new file mode 100644 index 00000000..00f79707 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7577.md @@ -0,0 +1,115 @@ +--- +layout: advisory +title: 'CVE-2015-7577 (activerecord): Nested attributes rejection proc bypass in Active + Record' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2015-7577 + ghsa: xrr6-3pc4-m447 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g + title: Nested attributes rejection proc bypass in Active Record + date: 2016-01-25 + description: | + There is a vulnerability in how the nested attributes feature in Active Record + handles updates in combination with destroy flags when destroying records is + disabled. This vulnerability has been assigned the CVE identifier CVE-2015-7577. + + Versions Affected: 3.1.0 and newer + Not affected: 3.0.x and older + Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1 + + Impact + ------ + When using the nested attributes feature in Active Record you can prevent the + destruction of associated records by passing the `allow_destroy: false` option + to the `accepts_nested_attributes_for` method. However due to a change in the + commit [a9b4b5d][1] the `_destroy` flag prevents the `:reject_if` proc from + being called because it assumes that the record will be destroyed anyway. + + However this isn't true if `:allow_destroy` is false so this leads to changes + that would have been rejected being applied to the record. Attackers could use + this do things like set attributes to invalid values and to clear all of the + attributes amongst other things. The severity will be dependent on how the + application has used this feature. + + All users running an affected release should either upgrade or use one of + the workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + If you can't upgrade, please use the following monkey patch in an initializer + that is loaded before your application: + + ``` + $ cat config/initializers/nested_attributes_bypass_fix.rb + module ActiveRecord + module NestedAttributes + private + + def reject_new_record?(association_name, attributes) + will_be_destroyed?(association_name, attributes) || call_reject_if(association_name, attributes) + end + + def call_reject_if(association_name, attributes) + return false if will_be_destroyed?(association_name, attributes) + + case callback = self.nested_attributes_options[association_name][:reject_if] + when Symbol + method(callback).arity == 0 ? send(callback) : send(callback, attributes) + when Proc + callback.call(attributes) + end + end + + def will_be_destroyed?(association_name, attributes) + allow_destroy?(association_name) && has_destroy_flag?(attributes) + end + + def allow_destroy?(association_name) + self.nested_attributes_options[association_name][:allow_destroy] + end + end + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 3-2-nested-attributes-reject-if-bypass.patch - Patch for 3.2 series + * 4-1-nested-attributes-reject-if-bypass.patch - Patch for 4.1 series + * 4-2-nested-attributes-reject-if-bypass.patch - Patch for 4.2 series + * 5-0-nested-attributes-reject-if-bypass.patch - Patch for 5.0 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users + of earlier unsupported releases are advised to upgrade as soon as possible as we + cannot guarantee the continued availability of security fixes for unsupported + releases. + + Credits + ------- + Thank you to Justin Coyne for reporting the problem and working with us to fix it. + + [1]: https://github.com/rails/rails/commit/a9b4b5da7c216e4464eeb9dbd0a39ea258d64325 + cvss_v2: 5.0 + cvss_v3: 5.3 + unaffected_versions: + - "~> 3.0.0" + - "< 3.0.0" + patched_versions: + - ">= 5.0.0.beta1.1" + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" + - "~> 3.2.22.1" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7578.md b/advisories/_posts/2016-01-25-CVE-2015-7578.md new file mode 100644 index 00000000..f0888eaf --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7578.md @@ -0,0 +1,53 @@ +--- +layout: advisory +title: 'CVE-2015-7578 (rails-html-sanitizer): Possible XSS vulnerability in rails-html-sanitizer' +comments: false +categories: +- rails-html-sanitizer +advisory: + gem: rails-html-sanitizer + cve: 2015-7578 + ghsa: 59c7-4xj2-hgvw + url: https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI + title: Possible XSS vulnerability in rails-html-sanitizer + date: 2016-01-25 + description: | + There is a possible XSS vulnerability in rails-html-sanitizer. This + vulnerability has been assigned the CVE identifier CVE-2015-7578. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 1.0.3 + + Impact + ------ + There is a possible XSS vulnerability in rails-html-sanitizer. Certain + attributes are not removed from tags when they are sanitized, and these + attributes can lead to an XSS attack on target applications. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + There are no feasible workarounds for this issue. + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 1-0-sanitize_data_attributes.patch - Patch for 1.0 series + + Credits + ------- + Thanks to Ben Murphy and Marien for reporting this. + cvss_v3: 6.1 + patched_versions: + - ">= 1.0.3" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7579.md b/advisories/_posts/2016-01-25-CVE-2015-7579.md new file mode 100644 index 00000000..bb5e2904 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7579.md @@ -0,0 +1,80 @@ +--- +layout: advisory +title: 'CVE-2015-7579 (rails-html-sanitizer): XSS vulnerability in rails-html-sanitizer' +comments: false +categories: +- rails-html-sanitizer +advisory: + gem: rails-html-sanitizer + cve: 2015-7579 + ghsa: r9c2-cr39-c8g6 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/OU9ugTZcbjc + title: XSS vulnerability in rails-html-sanitizer + date: 2016-01-25 + description: | + There is a XSS vulnerability in `Rails::Html::FullSanitizer` used by Action View's `strip_tags`. + This vulnerability has been assigned the CVE identifier CVE-2015-7579. + + Versions Affected: 1.0.2 + Not affected: 1.0.0, 1.0.1 + Fixed Versions: 1.0.3 + + Impact + ------ + Due to the way that `Rails::Html::FullSanitizer` is implemented, if an attacker + passes an already escaped HTML entity to the input of Action View's `strip_tags` + these entities will be unescaped what may cause a XSS attack if used in combination + with `raw` or `html_safe`. + + For example: + + strip_tags("<script>alert('XSS')</script>") + + Would generate: + + + + After the fix it will generate: + + <script>alert('XSS')</script> + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + If you can't upgrade, please use the following monkey patch in an initializer + that is loaded before your application: + + ``` + $ cat config/initializers/strip_tags_fix.rb + class ActionView::Base + def strip_tags(html) + self.class.full_sanitizer.sanitize(html) + end + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches + for the two supported release series. They are in git-am format and consist + of a single changeset. + + * Do-not-unescape-already-escaped-HTML-entities.patch + + Credits + ------- + Thank you to Arthur Neves from GitHub and Spyros Livathinos from Zendesk for + reporting the problem and working with us to fix it. + cvss_v3: 6.1 + unaffected_versions: + - "~> 1.0.0" + - "~> 1.0.1" + patched_versions: + - ">= 1.0.3" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7580.md b/advisories/_posts/2016-01-25-CVE-2015-7580.md new file mode 100644 index 00000000..d2f58836 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7580.md @@ -0,0 +1,76 @@ +--- +layout: advisory +title: 'CVE-2015-7580 (rails-html-sanitizer): Possible XSS vulnerability in rails-html-sanitizer' +comments: false +categories: +- rails-html-sanitizer +advisory: + gem: rails-html-sanitizer + cve: 2015-7580 + ghsa: ghqm-pgxj-37gq + url: https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI + title: Possible XSS vulnerability in rails-html-sanitizer + date: 2016-01-25 + description: | + There is a possible XSS vulnerability in the white list sanitizer in the + rails-html-sanitizer gem. This vulnerability has been assigned the CVE + identifier CVE-2015-7580. + + Versions Affected: All. + Not affected: None. + Fixed Versions: v1.0.3 + + Impact + ------ + Carefully crafted strings can cause user input to bypass the sanitization in + the white list sanitizer which will can lead to an XSS attack. + + Vulnerable code will look something like this: + + <%= sanitize user_input, tags: %w(em) %> + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + Putting the following monkey patch in an initializer can help to mitigate the + issue: + + ``` + class Rails::Html::PermitScrubber + alias :old_scrub :scrub + alias :old_skip_node? :skip_node? + + def scrub(node) + if node.cdata? + text = node.document.create_text_node node.text + node.replace text + return CONTINUE + end + old_scrub node + end + + def skip_node?(node); node.text?; end + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 1-0-whitelist_sanitizer_xss.patch - Patch for 1.0 series + + Credits + ------- + Thanks to Arnaud Germis, Nate Clark, and John Colvin for reporting this issue. + cvss_v3: 6.1 + patched_versions: + - ">= 1.0.3" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2015-7581.md b/advisories/_posts/2016-01-25-CVE-2015-7581.md new file mode 100644 index 00000000..af761bd4 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2015-7581.md @@ -0,0 +1,62 @@ +--- +layout: advisory +title: 'CVE-2015-7581 (actionpack): Object leak vulnerability for wildcard controller + routes in Action Pack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2015-7581 + ghsa: 9h6g-gp95-x3q5 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE + title: Object leak vulnerability for wildcard controller routes in Action Pack + date: 2016-01-25 + description: | + There is an object leak vulnerability for wildcard controllers in Action Pack. + This vulnerability has been assigned the CVE identifier CVE-2015-7581. + + Versions Affected: >= 4.0.0 and < 5.0.0.beta1 + Not affected: < 4.0.0, 5.0.0.beta1 and newer + Fixed Versions: 4.2.5.1, 4.1.14.1 + + Impact + ------ + Users that have a route that contains the string ":controller" are susceptible + to objects being leaked globally which can lead to unbounded memory growth. + To identify if your application is vulnerable, look for routes that contain + ":controller". + + Internally, Action Pack keeps a map of "url controller name" to "controller + class name". This map is cached globally, and is populated even if the + controller class doesn't actually exist. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + There are no feasible workarounds for this issue. + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. + + * 4-1-wildcard_route.patch - Patch for 4.1 series + * 4-2-wildcard_route.patch - Patch for 4.2 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + cvss_v3: 7.5 + unaffected_versions: + - "< 4.0.0" + - ">= 5.0.0.beta1" + patched_versions: + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2016-0751.md b/advisories/_posts/2016-01-25-CVE-2016-0751.md new file mode 100644 index 00000000..b5dc1c85 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2016-0751.md @@ -0,0 +1,80 @@ +--- +layout: advisory +title: 'CVE-2016-0751 (actionpack): Possible Object Leak and Denial of Service attack + in Action Pack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2016-0751 + ghsa: ffpv-c4hm-3x6v + url: https://groups.google.com/forum/#!topic/rubyonrails-security/9oLY_FCzvoc + title: Possible Object Leak and Denial of Service attack in Action Pack + date: 2016-01-25 + description: | + There is a possible object leak which can lead to a denial of service + vulnerability in Action Pack. This vulnerability has been + assigned the CVE identifier CVE-2016-0751. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1 + + Impact + ------ + A carefully crafted accept header can cause a global cache of mime types to + grow indefinitely which can lead to a possible denial of service attack in + Action Pack. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + This attack can be mitigated by a proxy that only allows known mime types in + the Accept header. + + Placing the following code in an initializer will also mitigate the issue: + + ```ruby + require 'action_dispatch/http/mime_type' + + Mime.const_set :LOOKUP, Hash.new { |h,k| + Mime::Type.new(k) unless k.blank? + } + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 5-0-mime_types_leak.patch - Patch for 5.0 series + * 4-2-mime_types_leak.patch - Patch for 4.2 series + * 4-1-mime_types_leak.patch - Patch for 4.1 series + * 3-2-mime_types_leak.patch - Patch for 3.2 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users + of earlier unsupported releases are advised to upgrade as soon as possible as we + cannot guarantee the continued availability of security fixes for unsupported + releases. + + Credits + ------- + Aaron Patterson <3<3 + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 5.0.0.beta1.1" + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" + - "~> 3.2.22.1" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2016-0752.md b/advisories/_posts/2016-01-25-CVE-2016-0752.md new file mode 100644 index 00000000..af91697e --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2016-0752.md @@ -0,0 +1,101 @@ +--- +layout: advisory +title: 'CVE-2016-0752 (actionview): Possible Information Leak Vulnerability in Action + View' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2016-0752 + ghsa: xrr4-p6fq-hjg7 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00 + title: Possible Information Leak Vulnerability in Action View + date: 2016-01-25 + description: | + There is a possible directory traversal and information leak vulnerability in + Action View. This vulnerability has been assigned the CVE identifier + CVE-2016-0752. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, 3.2.22.1 + + Impact + ------ + Applications that pass unverified user input to the `render` method in a + controller may be vulnerable to an information leak vulnerability. + + Impacted code will look something like this: + + ```ruby + def index + render params[:id] + end + ``` + + Carefully crafted requests can cause the above code to render files from + unexpected places like outside the application's view directory, and can + possibly escalate this to a remote code execution attack. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + A workaround to this issue is to not pass arbitrary user input to the `render` + method. Instead, verify that data before passing it to the `render` method. + + For example, change this: + + ```ruby + def index + render params[:id] + end + ``` + + To this: + + ```ruby + def index + render verify_template(params[:id]) + end + + private + def verify_template(name) + # add verification logic particular to your application here + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 3-2-render_data_leak.patch - Patch for 3.2 series + * 4-1-render_data_leak.patch - Patch for 4.1 series + * 4-2-render_data_leak.patch - Patch for 4.2 series + * 5-0-render_data_leak.patch - Patch for 5.0 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users + of earlier unsupported releases are advised to upgrade as soon as possible as we + cannot guarantee the continued availability of security fixes for unsupported + releases. + + Credits + ------- + Thanks John Poulin for reporting this! + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 5.0.0.beta1.1" + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" +--- diff --git a/advisories/_posts/2016-01-25-CVE-2016-0753.md b/advisories/_posts/2016-01-25-CVE-2016-0753.md new file mode 100644 index 00000000..b66c0c44 --- /dev/null +++ b/advisories/_posts/2016-01-25-CVE-2016-0753.md @@ -0,0 +1,100 @@ +--- +layout: advisory +title: 'CVE-2016-0753 (activemodel): Possible Input Validation Circumvention in Active + Model' +comments: false +categories: +- activemodel +- rails +advisory: + gem: activemodel + framework: rails + cve: 2016-0753 + ghsa: 543v-gj2c-r3ch + url: https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ + title: Possible Input Validation Circumvention in Active Model + date: 2016-01-25 + description: | + There is a possible input validation circumvention vulnerability in Active + Model. This vulnerability has been assigned the CVE identifier CVE-2016-0753. + + Versions Affected: 4.1.0 and newer + Not affected: 4.0.13 and older + Fixed Versions: 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1 + + Impact + ------ + Code that uses Active Model based models (including Active Record models) and + does not validate user input before passing it to the model can be subject to + an attack where specially crafted input will cause the model to skip + validations. + + Vulnerable code will look something like this: + + ```ruby + SomeModel.new(unverified_user_input) + ``` + + Rails users using Strong Parameters are generally not impacted by this issue + as they are encouraged to whitelist parameters and must specifically opt-out + of input verification using the `permit!` method to allow mass assignment. + + For example, a vulnerable Rails application will have code that looks like + this: + + ```ruby + def create + params.permit! # allow all parameters + @user = User.new params[:users] + end + ``` + + Active Model and Active Record objects are not equipped to handle arbitrary + user input. It is up to the application to verify input before passing it to + Active Model models. Rails users already have Strong Parameters in place to + handle white listing, but applications using Active Model and Active Record + outside of a Rails environment may be impacted. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + There are several workarounds depending on the application. Inside a Rails + application, stop using `permit!`. Outside a Rails application, either use + Hash#slice to select the parameters you need, or integrate Strong Parameters + with your application. + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches for + the two supported release series. They are in git-am format and consist of a + single changeset. + + * 4-1-validation_skip.patch - Patch for 4.1 series + * 4-2-validation_skip.patch - Patch for 4.2 series + * 5-0-validation_skip.patch - Patch for 5.0 series + + Please note that only the 4.1.x and 4.2.x series are supported at present. Users + of earlier unsupported releases are advised to upgrade as soon as possible as we + cannot guarantee the continued availability of security fixes for unsupported + releases. + + Credits + ------- + Thanks to: + + [John Backus](https://github.com/backus) from BlockScore for reporting this! + cvss_v2: 5.0 + cvss_v3: 5.3 + unaffected_versions: + - "<= 4.0.13" + patched_versions: + - ">= 5.0.0.beta1.1" + - "~> 4.2.5, >= 4.2.5.1" + - "~> 4.1.14, >= 4.1.14.1" +--- diff --git a/advisories/_posts/2016-02-29-CVE-2016-2097.md b/advisories/_posts/2016-02-29-CVE-2016-2097.md new file mode 100644 index 00000000..0141f134 --- /dev/null +++ b/advisories/_posts/2016-02-29-CVE-2016-2097.md @@ -0,0 +1,95 @@ +--- +layout: advisory +title: 'CVE-2016-2097 (actionview): Possible Information Leak Vulnerability in Action + View' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2016-2097 + ghsa: vx9j-46rh-fqr8 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/ddY6HgqB2z4 + title: Possible Information Leak Vulnerability in Action View + date: 2016-02-29 + description: |2 + + There is a possible directory traversal and information leak vulnerability + in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 + patch was not covering all the scenarios. This vulnerability has been + assigned the CVE identifier CVE-2016-2097. + + Versions Affected: 3.2.x, 4.0.x, 4.1.x + Not affected: 4.2+ + Fixed Versions: 3.2.22.2, 4.1.14.2 + + Impact + ------ + Applications that pass unverified user input to the `render` method in a + controller may be vulnerable to an information leak vulnerability. + + Impacted code will look something like this: + + ```ruby + def index + render params[:id] + end + ``` + + Carefully crafted requests can cause the above code to render files from + unexpected places like outside the application's view directory, and can + possibly escalate this to a remote code execution attack. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + A workaround to this issue is to not pass arbitrary user input to the `render` + method. Instead, verify that data before passing it to the `render` method. + + For example, change this: + + ```ruby + def index + render params[:id] + end + ``` + + To this: + + ```ruby + def index + render verify_template(params[:id]) + end + + private + def verify_template(name) + # add verification logic particular to your application here + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided patches + for it. It is in git-am format and consist of a single changeset. + + * 3-2-render_data_leak_2.patch - Patch for 3.2 series + * 4-1-render_data_leak_2.patch - Patch for 4.1 series + + Credits + ------- + Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this + and working with us in the patch! + cvss_v3: 5.3 + unaffected_versions: + - ">= 4.2.0" + patched_versions: + - "~> 4.1.14, >= 4.1.14.2" +--- diff --git a/advisories/_posts/2016-02-29-CVE-2016-2098.md b/advisories/_posts/2016-02-29-CVE-2016-2098.md new file mode 100644 index 00000000..7c18c910 --- /dev/null +++ b/advisories/_posts/2016-02-29-CVE-2016-2098.md @@ -0,0 +1,96 @@ +--- +layout: advisory +title: 'CVE-2016-2098 (actionpack): Possible remote code execution vulnerability in + Action Pack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2016-2098 + ghsa: 78rc-8c29-p45g + url: https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q + title: Possible remote code execution vulnerability in Action Pack + date: 2016-02-29 + description: | + There is a possible remote code execution vulnerability in Action Pack. + This vulnerability has been assigned the CVE identifier CVE-2016-2098. + + Versions Affected: 3.2.x, 4.0.x, 4.1.x, 4.2.x + Not affected: 5.0+ + Fixed Versions: 3.2.22.2, 4.1.14.2, 4.2.5.2 + + Impact + ------ + Applications that pass unverified user input to the `render` method in a + controller or a view may be vulnerable to a code injection. + + Impacted code will look like this: + + ```ruby + class TestController < ApplicationController + def show + render params[:id] + end + end + ``` + + An attacker could use the request parameters to coerce the above example + to execute arbitrary ruby code. + + All users running an affected release should either upgrade or use one of + the workarounds immediately. + + Releases + -------- + The FIXED releases are available at the normal locations. + + Workarounds + ----------- + A workaround to this issue is to not pass arbitrary user input to the `render` + method. Instead, verify that data before passing it to the `render` method. + + For example, change this: + + ```ruby + def index + render params[:id] + end + ``` + + To this: + + ```ruby + def index + render verify_template(params[:id]) + end + + private + def verify_template(name) + # add verification logic particular to your application here + end + ``` + + Patches + ------- + To aid users who aren't able to upgrade immediately we have provided a + patch for it. It is in git-am format and consist of a single changeset. + + * 3-2-secure_inline_with_params.patch - Patch for 3.2 series + * 4-1-secure_inline_with_params.patch - Patch for 4.1 series + * 4-2-secure_inline_with_params.patch - Patch for 4.2 series + + Credits + ------- + Thanks to both Tobias Kraze from makandra and joernchen of Phenoelit for + reporting this! + cvss_v3: 7.3 + unaffected_versions: + - ">= 5.0.0.beta1" + patched_versions: + - "~> 3.2.22.2" + - "~> 4.2.5, >= 4.2.5.2" + - "~> 4.1.14, >= 4.1.14.2" +--- diff --git a/advisories/_posts/2016-04-01-CVE-2016-3098.md b/advisories/_posts/2016-04-01-CVE-2016-3098.md new file mode 100644 index 00000000..46ba3ff5 --- /dev/null +++ b/advisories/_posts/2016-04-01-CVE-2016-3098.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2016-3098 (administrate): Cross-site request forgery (CSRF) vulnerability + in administrate gem' +comments: false +categories: +- administrate +advisory: + gem: administrate + cve: 2016-3098 + ghsa: cc8c-26rj-v2vx + url: http://seclists.org/oss-sec/2016/q2/0 + title: Cross-site request forgery (CSRF) vulnerability in administrate gem + date: 2016-04-01 + description: | + "`Administrate::ApplicationController` actions didn't have CSRF protection. + Remote attackers can hijack user's sessions and use any functionality that administrate + exposes on their behalf." + cvss_v3: 5.4 + patched_versions: + - ">= 0.1.5" +--- diff --git a/advisories/_posts/2016-04-13-CVE-2016-10193.md b/advisories/_posts/2016-04-13-CVE-2016-10193.md new file mode 100644 index 00000000..26e97227 --- /dev/null +++ b/advisories/_posts/2016-04-13-CVE-2016-10193.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2016-10193 (espeak-ruby): espeak-ruby Gem for Ruby Arbitrary Command Execution' +comments: false +categories: +- espeak-ruby +advisory: + gem: espeak-ruby + cve: 2016-10193 + ghsa: 4jm3-pfpf-h54p + url: https://github.com/dejan/espeak-ruby/issues/7 + title: espeak-ruby Gem for Ruby Arbitrary Command Execution + date: 2016-04-13 + description: | + espeak-ruby passes user modifiable strings directly to a shell + command. An attacker can execute malicious commands by modifying + the strings that are passed as arguments to the speak, save, bytes + and bytes_wav methods in the lib/espeak/speech.rb library. + cvss_v3: 9.8 + patched_versions: + - ">= 1.0.3" +--- diff --git a/advisories/_posts/2016-04-20-CVE-2016-3693.md b/advisories/_posts/2016-04-20-CVE-2016-3693.md new file mode 100644 index 00000000..684997a5 --- /dev/null +++ b/advisories/_posts/2016-04-20-CVE-2016-3693.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2016-3693 (safemode): Safemode Gem for Ruby is vulnerable to information + disclosure' +comments: false +categories: +- safemode +advisory: + gem: safemode + cve: 2016-3693 + ghsa: c92m-rrrc-q5wf + url: http://seclists.org/oss-sec/2016/q2/119 + title: Safemode Gem for Ruby is vulnerable to information disclosure + date: 2016-04-20 + description: | + Safemode is initialised with an optional 'delegate' object. + If the delegated object is a Rails controller, 'inspect' could + be called which then exposes all informations about the App, + including routes, secret tokens, caches and so on. + cvss_v3: 8.1 + patched_versions: + - ">= 1.2.4" +--- diff --git a/advisories/_posts/2016-04-23-CVE-2016-10194.md b/advisories/_posts/2016-04-23-CVE-2016-10194.md new file mode 100644 index 00000000..890858bc --- /dev/null +++ b/advisories/_posts/2016-04-23-CVE-2016-10194.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2016-10194 (festivaltts4r): festivaltts4r Gem for Ruby Arbitrary Command + Execution' +comments: false +categories: +- festivaltts4r +advisory: + gem: festivaltts4r + cve: 2016-10194 + ghsa: f7f4-5w9j-23p2 + url: https://github.com/spejman/festivaltts4r/issues/1 + title: festivaltts4r Gem for Ruby Arbitrary Command Execution + date: 2016-04-23 + description: | + festivaltts4r passes user modifiable strings directly to a shell + command. An attacker can execute malicious commands by modifying + the strings that are passed as arguments to the to_speech and + and to_mp3 methods in lib/festivaltts4r/festival4r.rb library. + cvss_v3: 9.8 +--- diff --git a/advisories/_posts/2016-04-26-CVE-2016-2785.md b/advisories/_posts/2016-04-26-CVE-2016-2785.md new file mode 100644 index 00000000..6ed3254a --- /dev/null +++ b/advisories/_posts/2016-04-26-CVE-2016-2785.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2016-2785 (puppet): Puppet Improper Access Control' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2016-2785 + ghsa: pqj5-7r86-64fv + url: https://www.puppet.com/security/cve/cve-2016-2785-incorrect-url-decoding + title: Puppet Improper Access Control + date: 2016-04-26 + description: | + Puppet Server before 2.3.2 and + Ruby puppetmaster in Puppet 4.x before 4.4.2 and in + Puppet Agent before 1.4.2 + might allow remote attackers to bypass intended auth.conf + access restrictions by leveraging incorrect URL decoding. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 4.4.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2016-2785 + - https://www.puppet.com/security/cve/cve-2016-2785-incorrect-url-decoding + - https://github.com/puppetlabs/puppet/pull/4921 + - https://github.com/puppetlabs/puppet/pull/4921/commits/8d2ce797db265720f0a20d1d46ee2757b4e4f6b2 + - https://security.gentoo.org/glsa/201606-02 + - https://github.com/advisories/GHSA-pqj5-7r86-64fv +--- diff --git a/advisories/_posts/2016-05-18-CVE-2016-4442.md b/advisories/_posts/2016-05-18-CVE-2016-4442.md new file mode 100644 index 00000000..bb5be4ac --- /dev/null +++ b/advisories/_posts/2016-05-18-CVE-2016-4442.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2016-4442 (rack-mini-profiler): rack-mini-profiler may disclose information + to unauthorized users' +comments: false +categories: +- rack-mini-profiler +advisory: + gem: rack-mini-profiler + cve: 2016-4442 + ghsa: j5hj-fhc9-g24m + url: https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c + title: rack-mini-profiler may disclose information to unauthorized users + date: 2016-05-18 + description: | + Carefully crafted requests can expose information about strings and objects + allocated during the request for unauthorised users. + cvss_v3: 5.3 + patched_versions: + - ">= 0.10.1" + related: + url: + - http://seclists.org/oss-sec/2016/q2/516 +--- diff --git a/advisories/_posts/2016-06-07-CVE-2015-8806.md b/advisories/_posts/2016-06-07-CVE-2015-8806.md new file mode 100644 index 00000000..38bbde5d --- /dev/null +++ b/advisories/_posts/2016-06-07-CVE-2015-8806.md @@ -0,0 +1,50 @@ +--- +layout: advisory +title: 'CVE-2015-8806 (nokogiri): Denial of service or RCE from libxml2 and libxslt' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2015-8806 + ghsa: 7hp2-xwpj-95jq + url: https://github.com/sparklemotion/nokogiri/issues/1473 + title: Denial of service or RCE from libxml2 and libxslt + date: 2016-06-07 + description: | + Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, + which are libraries Nokogiri depends on. It was discovered that libxml2 and + libxslt incorrectly handled certain malformed documents, which can allow + malicious users to cause issues ranging from denial of service to remote code + execution attacks. + + For more information, the Ubuntu Security Notice is a good start: + http://www.ubuntu.com/usn/usn-2994-1/ + cvss_v3: 7.5 + unaffected_versions: + - "< 1.6.0" + patched_versions: + - ">= 1.6.8" + related: + cve: + - 2016-1762 + - 2016-1833 + - 2016-1834 + - 2016-1835 + - 2016-1836 + - 2016-1837 + - 2016-1838 + - 2016-1839 + - 2016-1840 + - 2016-2073 + - 2016-3627 + - 2016-3705 + - 2016-4447 + - 2016-4449 + - 2016-4483 + url: + - https://github.com/sparklemotion/nokogiri/issues/1473 + - https://github.com/sparklemotion/nokogiri/commit/03d402212707bd5dfa0a21b7de5e91a7f9d90028 + - https://mail.gnome.org/archives/xml/2016-May/msg00023.html + - http://www.ubuntu.com/usn/usn-2994-1/ +--- diff --git a/advisories/_posts/2016-06-16-CVE-2016-10362.md b/advisories/_posts/2016-06-16-CVE-2016-10362.md new file mode 100644 index 00000000..54dc2068 --- /dev/null +++ b/advisories/_posts/2016-06-16-CVE-2016-10362.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2016-10362 (logstash-core): Logstash Logs Sensitive Information' +comments: false +categories: +- logstash-core +advisory: + gem: logstash-core + cve: 2016-10362 + ghsa: 3gg4-6hqg-2vjx + url: https://web.archive.org/web/20210730201452/http://www.securityfocus.com/bid/99154 + title: Logstash Logs Sensitive Information + date: 2016-06-16 + description: | + Prior to Logstash version 5.0.1, Elasticsearch Output plugin when updating + connections after sniffing, would log to file HTTP basic auth credentials. + cvss_v2: 4.0 + cvss_v3: 6.5 + patched_versions: + - ">= 5.0.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2016-10362 + - https://web.archive.org/web/20210730201452/http://www.securityfocus.com/bid/99154 + - https://www.opencve.io/cve/CVE-2016-10362 + - https://www.elastic.co/community/security + - https://github.com/advisories/GHSA-3gg4-6hqg-2vjx +--- diff --git a/advisories/_posts/2016-06-24-CVE-2016-5697.md b/advisories/_posts/2016-06-24-CVE-2016-5697.md new file mode 100644 index 00000000..87cdc216 --- /dev/null +++ b/advisories/_posts/2016-06-24-CVE-2016-5697.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2016-5697 (ruby-saml): XML signature wrapping attack' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + cve: 2016-5697 + ghsa: 36p7-xjw8-h6f2 + url: https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995 + title: XML signature wrapping attack + date: 2016-06-24 + description: | + ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack + in the specific scenario where there was a signature that referenced at the same time + 2 elements (but past the scheme validator process since 1 of the element was inside + the encrypted assertion). + + ruby-saml users must update to 1.3.0, which implements 3 extra validations to + mitigate this kind of attack. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 1.3.0" +--- diff --git a/advisories/_posts/2016-07-27-CVE-2016-10735.md b/advisories/_posts/2016-07-27-CVE-2016-10735.md new file mode 100644 index 00000000..5fd4d1e0 --- /dev/null +++ b/advisories/_posts/2016-07-27-CVE-2016-10735.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2016-10735 (bootstrap): XSS vulnerability via data-target in bootstrap' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2016-10735 + ghsa: 4p24-vmcr-4gqj + url: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/ + title: XSS vulnerability via data-target in bootstrap + date: 2016-07-27 + description: | + In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, + XSS is possible in the data-target attribute. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 4.0.0-beta.2" + related: + url: + - https://github.com/twbs/bootstrap/issues/20184 +--- diff --git a/advisories/_posts/2016-08-11-CVE-2016-6316.md b/advisories/_posts/2016-08-11-CVE-2016-6316.md new file mode 100644 index 00000000..e43fffc0 --- /dev/null +++ b/advisories/_posts/2016-08-11-CVE-2016-6316.md @@ -0,0 +1,61 @@ +--- +layout: advisory +title: 'CVE-2016-6316 (actionview): Possible XSS Vulnerability in Action View' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2016-6316 + ghsa: pc3m-v286-2jwj + url: https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk + title: Possible XSS Vulnerability in Action View + date: 2016-08-11 + description: | + There is a possible XSS vulnerability in Action View. Text declared as "HTML + safe" will not have quotes escaped when used as attribute values in tag + helpers. + + Impact + ------ + + Text declared as "HTML safe" when passed as an attribute value to a tag helper + will not have quotes escaped which can lead to an XSS attack. Impacted code + looks something like this: + + ```ruby + content_tag(:div, "hi", title: user_input.html_safe) + ``` + + Some helpers like the `sanitize` helper will automatically mark strings as + "HTML safe", so impacted code could also look something like this: + + ```ruby + content_tag(:div, "hi", title: sanitize(user_input)) + ``` + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Workarounds + ----------- + You can work around this issue by either *not* marking arbitrary user input as + safe, or by manually escaping quotes like this: + + ```ruby + def escape_quotes(value) + value.gsub(/"/, '"'.freeze) + end + + content_tag(:div, "hi", title: escape_quotes(sanitize(user_input))) + ``` + cvss_v3: 6.1 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 4.2.7.1" + - "~> 4.2.8" + - ">= 5.0.0.1" +--- diff --git a/advisories/_posts/2016-08-11-CVE-2016-6317.md b/advisories/_posts/2016-08-11-CVE-2016-6317.md new file mode 100644 index 00000000..07217f25 --- /dev/null +++ b/advisories/_posts/2016-08-11-CVE-2016-6317.md @@ -0,0 +1,79 @@ +--- +layout: advisory +title: 'CVE-2016-6317 (activerecord): Unsafe Query Generation Risk in Active Record' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2016-6317 + ghsa: pr3r-4wrp-r2pv + url: https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s + title: Unsafe Query Generation Risk in Active Record + date: 2016-08-11 + description: | + There is a vulnerability when Active Record is used in conjunction with JSON + parameter parsing. This vulnerability is similar to CVE-2012-2660, + CVE-2012-2694 and CVE-2013-0155. + + Impact + ------ + + Due to the way Active Record interprets parameters in combination with the way + that JSON parameters are parsed, it is possible for an attacker to issue + unexpected database queries with "IS NULL" or empty where clauses. This issue + does *not* let an attacker insert arbitrary values into an SQL query, however + they can cause the query to check for NULL or eliminate a WHERE clause when + most users wouldn't expect it. + + For example, a system has password reset with token functionality: + + ```ruby + unless params[:token].nil? + user = User.find_by_token(params[:token]) + user.reset_password! + end + ``` + + An attacker can craft a request such that `params[:token]` will return + `[nil]`. The `[nil]` value will bypass the test for nil, but will still add + an "IN ('xyz', NULL)" clause to the SQL query. + + Similarly, an attacker can craft a request such that `params[:token]` will + return an empty hash. An empty hash will eliminate the WHERE clause of the + query, but can bypass the `nil?` check. + + Note that this impacts not only dynamic finders (`find_by_*`) but also + relations (`User.where(:name => params[:name])`). + + All users running an affected release should either upgrade or use one of the + work arounds immediately. All users running an affected release should upgrade + immediately. Please note, this vulnerability is a variant of CVE-2012-2660, + CVE-2012-2694, and CVE-2013-0155. Even if you upgraded to address those + issues, you must take action again. + + If this chance in behavior impacts your application, you can manually decode + the original values from the request like so: + + `ActiveSupport::JSON.decode(request.body)` + + Workarounds + ----------- + This problem can be mitigated by casting the parameter to a string before + passing it to Active Record. For example: + + ```ruby + unless params[:token].nil? || params[:token].to_s.empty? + user = User.find_by_token(params[:token].to_s) + user.reset_password! + end + ``` + cvss_v3: 7.5 + unaffected_versions: + - "< 4.2.0" + - ">= 5.0.0" + patched_versions: + - ">= 4.2.7.1" +--- diff --git a/advisories/_posts/2016-08-18-CVE-2016-6582.md b/advisories/_posts/2016-08-18-CVE-2016-6582.md new file mode 100644 index 00000000..f64fbef6 --- /dev/null +++ b/advisories/_posts/2016-08-18-CVE-2016-6582.md @@ -0,0 +1,48 @@ +--- +layout: advisory +title: 'CVE-2016-6582 (doorkeeper): Doorkeeper gem does not revoke tokens & uses wrong + auth/auth method' +comments: false +categories: +- doorkeeper +advisory: + gem: doorkeeper + cve: 2016-6582 + ghsa: 3m6r-39p3-jq25 + url: http://www.openwall.com/lists/oss-security/2016/08/19/2 + title: Doorkeeper gem does not revoke tokens & uses wrong auth/auth method + date: 2016-08-18 + description: | + Doorkeeper failed to implement OAuth 2.0 Token Revocation (RFC 7009) in the + following ways: + + 1. Public clients making valid, unauthenticated calls to revoke a token + would not have their token revoked + 2. Requests were not properly authenticating the *client credentials* but + were, instead, looking at the access token in a second location + 3. Because of 2, the requests were also not authorizing confidential + clients' ability to revoke a given token. It should only revoke tokens + that belong to it. + + The security implication is: OAuth 2.0 clients who "log out" a user expect + to have the corresponding access & refresh tokens revoked, preventing an + attacker who may have already hijacked the session from continuing to + impersonate the victim. Because of the bug described above, this is not the + case. As far as OWASP is concerned, this counts as broken authentication + design. + + MITRE has assigned CVE-2016-6582 due to the security issues raised. An + attacker, thanks to 1, can replay a hijacked session after a victim logs + out/revokes their token. Additionally, thanks to 2 & 3, an attacker via a + compromised confidential client could "grief" other clients by revoking + their tokens (albeit this is an exceptionally narrow attack with little + value). + cvss_v3: 9.1 + unaffected_versions: + - "< 1.2.0" + patched_versions: + - ">= 4.2.0" + related: + url: + - https://github.com/doorkeeper-gem/doorkeeper/commit/fb938051777a3c9cb071e96fc66458f8f615bd53 +--- diff --git a/advisories/_posts/2016-08-22-CVE-2016-10173.md b/advisories/_posts/2016-08-22-CVE-2016-10173.md new file mode 100644 index 00000000..af9e6980 --- /dev/null +++ b/advisories/_posts/2016-08-22-CVE-2016-10173.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2016-10173 (minitar): Minitar Directory Traversal Vulnerability' +comments: false +categories: +- minitar +advisory: + gem: minitar + cve: 2016-10173 + ghsa: h5g2-38x9-4gv3 + url: https://github.com/halostatue/minitar/issues/16 + title: Minitar Directory Traversal Vulnerability + date: 2016-08-22 + description: | + Minitar allows attackers to overwrite arbitrary files during archive + extraction via a .. (dot dot) in an extracted filename. Analogous + vulnerabilities for unzip and tar: + https://www.cvedetails.com/cve/CVE-2001-1268/ and + http://www.cvedetails.com/cve/CVE-2001-1267/ + + Credit: ecneladis + cvss_v3: 7.5 + patched_versions: + - ">= 0.6.0" + related: + url: + - https://github.com/halostatue/minitar/issues/16 + - https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4 +--- diff --git a/advisories/_posts/2016-08-27-CVE-2016-7103.md b/advisories/_posts/2016-08-27-CVE-2016-7103.md new file mode 100644 index 00000000..fe8d2632 --- /dev/null +++ b/advisories/_posts/2016-08-27-CVE-2016-7103.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2016-7103 (jquery-ui-rails): XSS Vulnerability on closeText option of + Dialog jQuery UI' +comments: false +categories: +- jquery-ui-rails +- rails +advisory: + gem: jquery-ui-rails + framework: rails + cve: 2016-7103 + ghsa: hpcf-8vf9-q4gj + url: https://github.com/jquery/api.jqueryui.com/issues/281 + title: XSS Vulnerability on closeText option of Dialog jQuery UI + date: 2016-08-27 + description: | + Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might + allow remote attackers to inject arbitrary web script or HTML via the + closeText parameter of the dialog function. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 6.0.0" + related: + url: + - https://github.com/jquery/jquery-ui/pull/1635 + - https://github.com/jquery-ui-rails/jquery-ui-rails/blob/master/History.md#600 +--- diff --git a/advisories/_posts/2016-10-06-CVE-2016-7954.md b/advisories/_posts/2016-10-06-CVE-2016-7954.md new file mode 100644 index 00000000..7631a636 --- /dev/null +++ b/advisories/_posts/2016-10-06-CVE-2016-7954.md @@ -0,0 +1,48 @@ +--- +layout: advisory +title: 'CVE-2016-7954 (bundler): Allows an attacker to inject arbitrary code into + your application via any secondary Gem source declared in your Gemfile' +comments: false +categories: +- bundler +advisory: + gem: bundler + cve: 2016-7954 + ghsa: jvgm-pfqv-887x + url: https://collectiveidea.com/blog/archives/2016/10/06/bundlers-multiple-source-security-vulnerability + title: Allows an attacker to inject arbitrary code into your application via any + secondary Gem source declared in your Gemfile + date: 2016-10-06 + description: | + Bundler 1.x might allow remote attackers to inject arbitrary Ruby + code into an application by leveraging a Gem name collision on a + secondary source. + + Please note that this vulnerability only applies for Ruby + projects using Bundler < 2.0 with Gemfiles having 2 or more + "source" lines. + + In other words, if the user's Gemfile does not use multiple + sources, this vulnerability can be ignored. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 2.0.0" + related: + cve: + - 2013-0334 + url: + - https://nvd.nist.gov/vuln/detail/CVE-2016-7954 + - https://collectiveidea.com/blog/archives/2016/10/06/bundlers-multiple-source-security-vulnerability + - https://bundler.io/blog/2014/08/14/bundler-may-install-gems-from-a-different-source-than-expected-cve-2013-0334.html + - https://github.com/advisories/GHSA-jvgm-pfqv-887x + - https://seclists.org/oss-sec/2016/q4/25 + - https://seclists.org/oss-sec/2016/q4/18 + - https://seclists.org/oss-sec/2016/q4/20 + - https://github.com/rubygems/bundler/pull/3696 + - https://github.com/rubygems/bundler/issues/3671 + - https://github.com/rubygems/bundler/issues/5274 + - https://github.com/rubygems/bundler/issues/5051 + - https://github.com/rubygems/bundler/issues/5062 + notes: 'NOTE: This might overlap CVE-2013-0334.; GHSA is unreviewed' +--- diff --git a/advisories/_posts/2016-11-09-CVE-2016-10345.md b/advisories/_posts/2016-11-09-CVE-2016-10345.md new file mode 100644 index 00000000..c98024d9 --- /dev/null +++ b/advisories/_posts/2016-11-09-CVE-2016-10345.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2016-10345 (passenger): Predictable tmp File Path Vulnerability in Phusion + Passenger' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2016-10345 + ghsa: cqxw-3p7v-p9gr + url: https://blog.phusion.nl/2017/01/10/passenger-5-1-1/ + title: Predictable tmp File Path Vulnerability in Phusion Passenger + date: 2016-11-09 + description: | + In Phusion Passenger before 5.1.0, a known /tmp filename was used during + passenger-install-nginx-module execution, which could allow local attackers to gain + the privileges of the passenger user. + cvss_v2: 4.6 + cvss_v3: 7.8 + patched_versions: + - ">= 5.1.0" +--- diff --git a/advisories/_posts/2016-12-21-CVE-2016-10522.md b/advisories/_posts/2016-12-21-CVE-2016-10522.md new file mode 100644 index 00000000..3671e6b2 --- /dev/null +++ b/advisories/_posts/2016-12-21-CVE-2016-10522.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2016-10522 (rails_admin): CSRF vulnerability in rails_admin' +comments: false +categories: +- rails_admin +advisory: + gem: rails_admin + cve: 2016-10522 + ghsa: pxqr-8v54-m2hj + url: https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/ + title: CSRF vulnerability in rails_admin + date: 2016-12-21 + description: | + The rails_admin gem is vulnerable to cross-site request forgery (CSRF) attacks. + Due to a bug, non-GET methods were not validating CSRF tokens and, as a result, + an attacker could hypothetically gain access to the application administrative + endpoints exposed by the gem. + cvss_v2: 5.5 + cvss_v3: 8.8 + unaffected_versions: + - "< 1.0.0" + patched_versions: + - ">= 1.1.1" + related: + url: + - https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173 + - https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a +--- diff --git a/advisories/_posts/2017-01-11-CVE-2017-18076.md b/advisories/_posts/2017-01-11-CVE-2017-18076.md new file mode 100644 index 00000000..ac1e64a5 --- /dev/null +++ b/advisories/_posts/2017-01-11-CVE-2017-18076.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2017-18076 (omniauth): omniauth leaks authenticity token in callback params' +comments: false +categories: +- omniauth +advisory: + gem: omniauth + cve: 2017-18076 + ghsa: 9pr6-grf4-x2fr + url: https://github.com/omniauth/omniauth/pull/867 + title: omniauth leaks authenticity token in callback params + date: 2017-01-11 + description: | + In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value + is improperly protected because POST (in addition to GET) parameters are stored + in the session and become available in the environment of the callback phase. + cvss_v2: 6.8 + cvss_v3: 7.5 + patched_versions: + - ">= 1.3.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2017-18076 +--- diff --git a/advisories/_posts/2017-02-27-CVE-2017-5946.md b/advisories/_posts/2017-02-27-CVE-2017-5946.md new file mode 100644 index 00000000..db6c5451 --- /dev/null +++ b/advisories/_posts/2017-02-27-CVE-2017-5946.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2017-5946 (rubyzip): Directory traversal vulnerability in rubyzip' +comments: false +categories: +- rubyzip +advisory: + gem: rubyzip + cve: 2017-5946 + ghsa: gcqq-w6gr-h9j9 + url: https://github.com/rubyzip/rubyzip/issues/315 + title: Directory traversal vulnerability in rubyzip + date: 2017-02-27 + description: | + The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a + directory traversal vulnerability. If a site allows uploading of .zip files, + an attacker can upload a malicious file that uses "../" pathname substrings to + write arbitrary files to the filesystem. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 1.2.1" +--- diff --git a/advisories/_posts/2017-03-11-CVE-2016-4658.md b/advisories/_posts/2017-03-11-CVE-2016-4658.md new file mode 100644 index 00000000..9166ac2e --- /dev/null +++ b/advisories/_posts/2017-03-11-CVE-2016-4658.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2016-4658 (nokogiri): Nokogiri gem contains several vulnerabilities in + libxml2 and libxslt' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2016-4658 + ghsa: fr52-4hqw-p27f + url: https://github.com/sparklemotion/nokogiri/issues/1615 + title: Nokogiri gem contains several vulnerabilities in libxml2 and libxslt + date: 2017-03-11 + description: | + Nokogiri version 1.7.1 has been released, pulling in several upstream + patches to the vendored libxml2 to address the following CVEs: + + CVE-2016-4658 + CVSS v3 Base Score: 9.8 (Critical) + libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and + watchOS before 3 allows remote attackers to execute arbitrary code or cause + a denial of service (memory corruption) via a crafted XML document. + + CVE-2016-5131 + CVSS v3 Base Score: 8.8 (HIGH) + Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google + Chrome before 52.0.2743.82, allows remote attackers to cause a denial of + service or possibly have unspecified other impact via vectors related to + the XPointer range-to function. + cvss_v2: 10.0 + cvss_v3: 9.8 + patched_versions: + - ">= 1.7.1" + related: + cve: + - 2016-5131 + url: + - https://github.com/sparklemotion/nokogiri/issues/1615 +--- diff --git a/advisories/_posts/2017-04-05-CVE-2017-7540.md b/advisories/_posts/2017-04-05-CVE-2017-7540.md new file mode 100644 index 00000000..c2c82602 --- /dev/null +++ b/advisories/_posts/2017-04-05-CVE-2017-7540.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2017-7540 (safemode): Safemode Gem for Ruby is vulnerable to bypassing + safe mode limitations' +comments: false +categories: +- safemode +advisory: + gem: safemode + cve: 2017-7540 + ghsa: 5vx5-9q73-wgp4 + url: https://nvd.nist.gov/vuln/detail/CVE-2017-7540 + title: Safemode Gem for Ruby is vulnerable to bypassing safe mode limitations + date: 2017-04-05 + description: | + Safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable + to bypassing safe mode limitations via special Ruby syntax. This can + lead to deletion of objects for which the user does not have delete + permissions or possibly to privilege escalation. + cvss_v3: 9.8 + patched_versions: + - ">= 1.3.3" + related: + url: + - https://github.com/svenfuchs/safemode/pull/23 +--- diff --git a/advisories/_posts/2017-05-01-CVE-2017-8418.md b/advisories/_posts/2017-05-01-CVE-2017-8418.md new file mode 100644 index 00000000..0b8ba913 --- /dev/null +++ b/advisories/_posts/2017-05-01-CVE-2017-8418.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2017-8418 (rubocop): RuboCop gem Insecure use of /tmp' +comments: false +categories: +- rubocop +advisory: + gem: rubocop + cve: 2017-8418 + ghsa: wmjf-jpjj-9f3j + url: https://github.com/bbatsov/rubocop/issues/4336 + title: RuboCop gem Insecure use of /tmp + date: 2017-05-01 + description: | + RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local + users to exploit this to tamper with cache files belonging to other users. + cvss_v2: 2.1 + cvss_v3: 3.3 + patched_versions: + - ">= 0.49.0" + related: + url: + - http://www.openwall.com/lists/oss-security/2017/05/01/14 +--- diff --git a/advisories/_posts/2017-05-08-CVE-2017-1002201.md b/advisories/_posts/2017-05-08-CVE-2017-1002201.md new file mode 100644 index 00000000..0259694b --- /dev/null +++ b/advisories/_posts/2017-05-08-CVE-2017-1002201.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2017-1002201 (haml): haml failure to escape single quotes' +comments: false +categories: +- haml +advisory: + gem: haml + cve: 2017-1002201 + ghsa: r53w-g4xm-3gc6 + url: https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2 + title: haml failure to escape single quotes + date: 2017-05-08 + description: | + In haml versions prior to version 5.0.0.beta.2, when using user input to + perform tasks on the server, characters like < > " ' must be escaped properly. + In this case, the ' character was missed. An attacker can manipulate the input + to introduce additional attributes, potentially executing code. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 5.0.0.beta.2" + related: + url: + - https://snyk.io/vuln/SNYK-RUBY-HAML-20362 +--- diff --git a/advisories/_posts/2017-05-09-CVE-2017-5029.md b/advisories/_posts/2017-05-09-CVE-2017-5029.md new file mode 100644 index 00000000..4436c5c1 --- /dev/null +++ b/advisories/_posts/2017-05-09-CVE-2017-5029.md @@ -0,0 +1,53 @@ +--- +layout: advisory +title: 'CVE-2017-5029 (nokogiri): Nokogiri gem contains two upstream vulnerabilities + in libxslt 1.1.29' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2017-5029 + ghsa: pf6m-fxpq-fg8v + url: https://github.com/sparklemotion/nokogiri/issues/1634 + title: Nokogiri gem contains two upstream vulnerabilities in libxslt 1.1.29 + date: 2017-05-09 + description: | + nokogiri version 1.7.2 has been released. + + This is a security update based on 1.7.1, addressing two upstream + libxslt 1.1.29 vulnerabilities classified as "Medium" by Canonical + and given a CVSS3 score of "6.5 Medium" and "8.8 High" by RedHat. + + These patches only apply when using Nokogiri's vendored libxslt + package. If you're using your distro's system libraries, there's no + need to upgrade from 1.7.0.1 or 1.7.1 at this time. + + Full details are available at the github issue linked to in the + changelog below. + + ----- + + # 1.7.2 / 2017-05-09 + + ## Security Notes + + [MRI] Upstream libxslt patches are applied to the vendored libxslt + 1.1.29 which address CVE-2017-5029 and CVE-2016-4738. + + For more information: + + * https://github.com/sparklemotion/nokogiri/issues/1634 + * http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5029.html + * http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4738.html + cvss_v3: 8.8 + patched_versions: + - ">= 1.7.2" + related: + cve: + - 2016-4738 + - 2017-5029 + url: + - http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5029.html + - http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4738.html +--- diff --git a/advisories/_posts/2017-06-16-CVE-2016-1000221.md b/advisories/_posts/2017-06-16-CVE-2016-1000221.md new file mode 100644 index 00000000..a010caa6 --- /dev/null +++ b/advisories/_posts/2017-06-16-CVE-2016-1000221.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2016-1000221 (logstash-core): Logstash Logs Sensitive Information' +comments: false +categories: +- logstash-core +advisory: + gem: logstash-core + cve: 2016-1000221 + ghsa: vcmm-ppqx-95ch + url: https://web.archive.org/web/20210124065200/http://www.securityfocus.com/bid/99126 + title: Logstash Logs Sensitive Information + date: 2017-06-16 + description: | + Logstash prior to version 2.3.4, Elasticsearch Output plugin would log + to file HTTP authorization headers which could contain sensitive information. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 2.3.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2016-1000221 + - https://web.archive.org/web/20210124065200/http://www.securityfocus.com/bid/99126 + - https://security-tracker.debian.org/tracker/CVE-2016-1000221 + - http://www.securityspace.com/smysecure/catid.html?id=1.3.6.1.4.1.25623.1.0.108361 + - https://www.scaprepo.com/control.jsp?command=relation&relationId=CVE-2016-1000221&search=CVE-2016-1000221 + - https://cve.reconshell.com/cve/CVE-2016-1000221 + - https://www.elastic.co/community/security + - https://github.com/advisories/GHSA-vcmm-ppqx-95ch +--- diff --git a/advisories/_posts/2017-07-11-CVE-2017-16833.md b/advisories/_posts/2017-07-11-CVE-2017-16833.md new file mode 100644 index 00000000..c262b58a --- /dev/null +++ b/advisories/_posts/2017-07-11-CVE-2017-16833.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2017-16833 (gemirro): Stored XSS in "gemirro" via injection in Gemspec + "homepage" value' +comments: false +categories: +- gemirro +advisory: + gem: gemirro + cve: 2017-16833 + ghsa: x7p2-x2j6-mwhr + url: https://github.com/PierreRambaud/gemirro/commit/9659f9b7ce15a723da8e361bd41b9203b19c97de + title: Stored XSS in "gemirro" via injection in Gemspec "homepage" value + date: 2017-07-11 + description: | + Stored cross-site scripting (XSS) vulnerability in Gemirro allows + attackers to inject arbitrary web script via a crafted JavaScript URL + in the "homepage" value of a ".gemspec" file. + + A ".gemspec" file must be created with a JavaScript URL in the homepage + value. This can be used to build a gem for upload to the Gemirro server, + in order to achieve stored XSS via the author name hyperlink. + cvss_v3: 6.1 + patched_versions: + - ">= 0.15.0" + related: + url: + - https://github.com/PierreRambaud/gemirro/commit/8acfb9ce9774128d535e2795d583242bb86d6ea8 + - https://github.com/PierreRambaud/gemirro/commit/8fa709b121b7e18fceda308917d0fb68dc1479c3 + - https://rubygems.org/gems/gemirro/versions/0.15.0 +--- diff --git a/advisories/_posts/2017-08-29-CVE-2017-0899.md b/advisories/_posts/2017-08-29-CVE-2017-0899.md new file mode 100644 index 00000000..75fe062f --- /dev/null +++ b/advisories/_posts/2017-08-29-CVE-2017-0899.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2017-0899 (rubygems-update): RubyGems ANSI escape sequence vulnerability' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2017-0899 + ghsa: 7gcp-2gmq-w3xh + url: https://blog.rubygems.org/2017/08/27/2.6.13-released.html + title: RubyGems ANSI escape sequence vulnerability + date: 2017-08-29 + description: | + RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem + specifications that include terminal escape characters. Printing the gem + specification would execute terminal escape sequences. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 2.4.5.3" + - ">= 2.5.2.1" + - ">= 2.6.13" +--- diff --git a/advisories/_posts/2017-08-29-CVE-2017-0900.md b/advisories/_posts/2017-08-29-CVE-2017-0900.md new file mode 100644 index 00000000..49d93b13 --- /dev/null +++ b/advisories/_posts/2017-08-29-CVE-2017-0900.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2017-0900 (rubygems-update): RubyGems DoS vulnerability in the query command' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2017-0900 + ghsa: p7f2-rr42-m9xm + url: https://blog.rubygems.org/2017/08/27/2.6.13-released.html + title: RubyGems DoS vulnerability in the query command + date: 2017-08-29 + description: | + RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem + specifications to cause a denial of service attack against RubyGems clients + who have issued a `query` command. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 2.4.5.3" + - ">= 2.5.2.1" + - ">= 2.6.13" +--- diff --git a/advisories/_posts/2017-08-29-CVE-2017-0901.md b/advisories/_posts/2017-08-29-CVE-2017-0901.md new file mode 100644 index 00000000..50b661bf --- /dev/null +++ b/advisories/_posts/2017-08-29-CVE-2017-0901.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2017-0901 (rubygems-update): RubyGems vulnerability in the gem installer + that allowed a malicious gem to overwrite arbitrary files' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2017-0901 + ghsa: pm9x-4392-2c2p + url: https://blog.rubygems.org/2017/08/27/2.6.13-released.html + title: RubyGems vulnerability in the gem installer that allowed a malicious gem + to overwrite arbitrary files + date: 2017-08-29 + description: | + RubyGems version 2.6.12 and earlier fails to validate specification names, + allowing a maliciously crafted gem to potentially overwrite any file on the + filesystem. + cvss_v2: 6.4 + cvss_v3: 7.5 + patched_versions: + - ">= 2.4.5.3" + - ">= 2.5.2.1" + - ">= 2.6.13" +--- diff --git a/advisories/_posts/2017-08-29-CVE-2017-0902.md b/advisories/_posts/2017-08-29-CVE-2017-0902.md new file mode 100644 index 00000000..fb55f641 --- /dev/null +++ b/advisories/_posts/2017-08-29-CVE-2017-0902.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2017-0902 (rubygems-update): RubyGems DNS request hijacking vulnerability' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2017-0902 + ghsa: 73w7-6w9g-gc8w + url: https://blog.rubygems.org/2017/08/27/2.6.13-released.html + title: RubyGems DNS request hijacking vulnerability + date: 2017-08-29 + description: | + RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking + vulnerability that allows a MITM attacker to force the RubyGems client to + down load and install gems from a server that the attacker controls. + cvss_v2: 6.8 + cvss_v3: 8.1 + patched_versions: + - ">= 2.4.5.3" + - ">= 2.5.2.1" + - ">= 2.6.13" +--- diff --git a/advisories/_posts/2017-09-19-CVE-2017-9050.md b/advisories/_posts/2017-09-19-CVE-2017-9050.md new file mode 100644 index 00000000..1246f8b8 --- /dev/null +++ b/advisories/_posts/2017-09-19-CVE-2017-9050.md @@ -0,0 +1,69 @@ +--- +layout: advisory +title: 'CVE-2017-9050 (nokogiri): Nokogiri gem, via libxml, is affected by DoS and + RCE vulnerabilities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2017-9050 + ghsa: 8c56-cpmw-89x7 + url: https://github.com/sparklemotion/nokogiri/issues/1673 + title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities + date: 2017-09-19 + description: | + The version of libxml2 packaged with Nokogiri contains several + vulnerabilities. Nokogiri has mitigated these issues by upgrading to + libxml 2.9.5. + + It was discovered that a type confusion error existed in libxml2. An + attacker could use this to specially construct XML data that + could cause a denial of service or possibly execute arbitrary + code. (CVE-2017-0663) + + It was discovered that libxml2 did not properly validate parsed entity + references. An attacker could use this to specially construct XML + data that could expose sensitive information. (CVE-2017-7375) + + It was discovered that a buffer overflow existed in libxml2 when + handling HTTP redirects. An attacker could use this to specially + construct XML data that could cause a denial of service or possibly + execute arbitrary code. (CVE-2017-7376) + + Marcel Böhme and Van-Thuan Pham discovered a buffer overflow in + libxml2 when handling elements. An attacker could use this to specially + construct XML data that could cause a denial of service or possibly + execute arbitrary code. (CVE-2017-9047) + + Marcel Böhme and Van-Thuan Pham discovered a buffer overread + in libxml2 when handling elements. An attacker could use this + to specially construct XML data that could cause a denial of + service. (CVE-2017-9048) + + Marcel Böhme and Van-Thuan Pham discovered multiple buffer overreads + in libxml2 when handling parameter-entity references. An attacker + could use these to specially construct XML data that could cause a + denial of service. (CVE-2017-9049, CVE-2017-9050) + cvss_v3: 7.5 + patched_versions: + - ">= 1.8.1" + related: + cve: + - 2017-0663 + - 2017-7375 + - 2017-7376 + - 2017-9047 + - 2017-9048 + - 2017-9049 + - 2017-9050 + url: + - https://usn.ubuntu.com/usn/usn-3424-1/ + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html +--- diff --git a/advisories/_posts/2017-10-09-CVE-2017-0903.md b/advisories/_posts/2017-10-09-CVE-2017-0903.md new file mode 100644 index 00000000..5e28f9fd --- /dev/null +++ b/advisories/_posts/2017-10-09-CVE-2017-0903.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2017-0903 (rubygems-update): Unsafe Object Deserialization Vulnerability + in RubyGems' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2017-0903 + ghsa: mqwr-4qf2-2hcv + url: https://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html + title: Unsafe Object Deserialization Vulnerability in RubyGems + date: 2017-10-09 + description: | + There is a possible unsafe object deserialization vulnerability in RubyGems. + It is possible for YAML deserialization of gem specifications to bypass class + white lists. Specially crafted serialized objects can possibly be used to + escalate to remote code execution. + cvss_v2: 7.5 + cvss_v3: 9.8 + unaffected_versions: + - "< 2.0.0" + patched_versions: + - ">= 2.6.14" +--- diff --git a/advisories/_posts/2017-10-24-CVE-2006-4111.md b/advisories/_posts/2017-10-24-CVE-2006-4111.md new file mode 100644 index 00000000..b890be2f --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2006-4111.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2006-4111 (rails): High severity vulnerability that affects rails' +comments: false +categories: +- rails +advisory: + gem: rails + cve: 2006-4111 + ghsa: rvpq-5xqx-pfpp + url: https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md + title: High severity vulnerability that affects rails + date: 2017-10-24 + description: | + Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code + with "severe" or "serious" impact via a File Upload request with an HTTP header + that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112. + cvss_v2: 7.5 + unaffected_versions: + - "< 1.1.0" + patched_versions: + - ">= 1.1.6" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2006-4111 + - https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md + - https://blog.evanweaver.com/2006/08/12/anatomy-of-an-attack-against-1-1-4 + - https://rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure + - http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits + - https://github.com/advisories/GHSA-rvpq-5xqx-pfpp + - http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml +--- diff --git a/advisories/_posts/2017-10-24-CVE-2006-4112.md b/advisories/_posts/2017-10-24-CVE-2006-4112.md new file mode 100644 index 00000000..7d6364bb --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2006-4112.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2006-4112 (rails): High severity vulnerability that affects rails.' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2006-4112 + ghsa: 9wrq-xvmp-xjc8 + url: https://exchange.xforce.ibmcloud.com/vulnerabilities/28364 + title: High severity vulnerability that affects rails. + date: 2017-10-24 + description: | + Unspecified vulnerability in the "dependency resolution mechanism" in + Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby + code via a URL that is not properly handled in the routing code, which leads to + a denial of service (application hang) or "data loss," a different vulnerability + than CVE-2006-4111. + cvss_v2: 7.5 + unaffected_versions: + - "< 1.1.0" + patched_versions: + - ">= 1.1.6" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2006-4112 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/28364 + - https://github.com/advisories/GHSA-9wrq-xvmp-xjc8 + - http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure + - https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md + - https://blog.evanweaver.com/2006/08/12/anatomy-of-an-attack-against-1-1-4 + - http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits + - http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml + - http://www.kb.cert.org/vuls/id/699540 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2007-3227.md b/advisories/_posts/2017-10-24-CVE-2007-3227.md new file mode 100644 index 00000000..24c0b233 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2007-3227.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2007-3227 (rails): Moderate severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2007-3227 + ghsa: gm25-fpmr-43fj + osvdb: 36378 + url: http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release + title: Moderate severity vulnerability that affects rails + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) + function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary + web script via the input values. + cvss_v2: 4.3 + patched_versions: + - ">= 1.2.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2007-3227 + - http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release + - http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release + - https://github.com/advisories/GHSA-gm25-fpmr-43fj + - http://bugs.gentoo.org/show_bug.cgi?id=195315 + - http://osvdb.org/36378 + - http://security.gentoo.org/glsa/glsa-200711-17.xml +--- diff --git a/advisories/_posts/2017-10-24-CVE-2007-5379.md b/advisories/_posts/2017-10-24-CVE-2007-5379.md new file mode 100644 index 00000000..759983d5 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2007-5379.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2007-5379 (rails): Moderate severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2007-5379 + osvdb: 40717 + ghsa: fjfg-q662-gm6j + url: http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release + title: Moderate severity vulnerability that affects rails + date: 2017-10-24 + description: | + Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers + and ActiveResource servers to determine the existence of arbitrary files and read + arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple + (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) + .purple/accounts.xml file. + cvss_v2: 5.0 + patched_versions: + - ">= 1.2.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2007-5379 + - http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release + - https://github.com/advisories/GHSA-fjfg-q662-gm6j + - http://bugs.gentoo.org/show_bug.cgi?id=195315 + - http://osvdb.org/40717 + - http://security.gentoo.org/glsa/glsa-200711-17.xml +--- diff --git a/advisories/_posts/2017-10-24-CVE-2007-5380.md b/advisories/_posts/2017-10-24-CVE-2007-5380.md new file mode 100644 index 00000000..71e75f99 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2007-5380.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2007-5380 (rails): Moderate severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2007-5380 + ghsa: jwhv-rgqc-fqj5 + url: http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release + title: Moderate severity vulnerability that affects rails + date: 2017-10-24 + description: | + Session fixation vulnerability in Rails before 1.2.4, as used for Ruby + on Rails, allows remote attackers to hijack web sessions via unspecified vectors + related to "URL-based sessions." + cvss_v2: 6.8 + patched_versions: + - ">= 1.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2007-5380 + - http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release + - https://github.com/advisories/GHSA-jwhv-rgqc-fqj5 + - http://bugs.gentoo.org/show_bug.cgi?id=195315 + - http://security.gentoo.org/glsa/glsa-200711-17.xml +--- diff --git a/advisories/_posts/2017-10-24-CVE-2007-6077.md b/advisories/_posts/2017-10-24-CVE-2007-6077.md new file mode 100644 index 00000000..1a365f75 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2007-6077.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2007-6077 (rails): Moderate severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2007-6077 + ghsa: p4c6-77gc-694x + url: https://rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release + title: Moderate severity vulnerability that affects rails + date: 2017-10-24 + description: | + The session fixation protection mechanism in cgi_process.rb in + Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only + attribute from the DEFAULT_SESSION_OPTIONS constant, which + effectively causes cookie_only to be applied only to the first + instantiation of CgiRequest, which allows remote attackers to + conduct session fixation attacks. + + NOTE: this is due to an incomplete fix for CVE-2007-5380. + cvss_v2: 6.8 + patched_versions: + - ">= 1.2.6" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2007-6077 + - http://weblog.rubyonrails.org/2007/11/24/ruby-on-rails-1-2-6-security-and-maintenance-release + - https://github.com/advisories/GHSA-p4c6-77gc-694x + - https://ubuntu.com/security/CVE-2007-6077 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2008-4094.md b/advisories/_posts/2017-10-24-CVE-2008-4094.md new file mode 100644 index 00000000..c143b5cf --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2008-4094.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2008-4094 (activerecord): High severity vulnerability that affects rails' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2008-4094 + ghsa: xf96-32q2-9rw2 + url: http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter + title: High severity vulnerability that affects rails + date: 2017-10-24 + description: | + Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 + allow remote attackers to execute arbitrary SQL commands via the + (1) :limit and (2) :offset parameters, related to ActiveRecord, + ActiveSupport, ActiveResource, ActionPack, and ActionMailer. + cvss_v2: 7.5 + patched_versions: + - "~> 2.0.0" + - ">= 2.1.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2008-4094 + - http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter + - https://rubyonrails.org/2008/10/23/rails-2-1-2-security-other-fixes + - https://github.com/rails/rails/commit/213f31513e4cb640fa3ed45f387f221401023646 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/45109 + - https://github.com/advisories/GHSA-xf96-32q2-9rw2 + - http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html + - http://rails.lighthouseapp.com/projects/8994/tickets/288 + - http://rails.lighthouseapp.com/projects/8994/tickets/964 + - http://www.openwall.com/lists/oss-security/2008/09/13/2 + - http://www.openwall.com/lists/oss-security/2008/09/16/1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2008-5189.md b/advisories/_posts/2017-10-24-CVE-2008-5189.md new file mode 100644 index 00000000..c532c9fd --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2008-5189.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2008-5189 (rails): Moderate severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2008-5189 + ghsa: jmgf-p46x-982h + url: http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing + title: Moderate severity vulnerability that affects rails + date: 2017-10-24 + description: | + CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote + attackers to inject arbitrary HTTP headers and conduct HTTP response + splitting attacks via a crafted URL to the redirect_to function. + cvss_v2: 5.0 + patched_versions: + - ">= 2.0.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2008-5189 + - http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing + - http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d + - http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk + - http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html + - https://github.com/advisories/GHSA-jmgf-p46x-982h +--- diff --git a/advisories/_posts/2017-10-24-CVE-2008-7248.md b/advisories/_posts/2017-10-24-CVE-2008-7248.md new file mode 100644 index 00000000..94ee6c1c --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2008-7248.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2008-7248 (actionpack): Improper Input Validation in rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2008-7248 + ghsa: 8fqx-7pv4-3jwm + url: https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1 + title: Improper Input Validation in rails + date: 2017-10-24 + description: | + Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify + tokens for requests with certain content types, which allows remote + attackers to bypass cross-site request forgery (CSRF) protection + for requests to applications that rely on this protection, as + demonstrated using text/plain. + cvss_v2: 6.8 + unaffected_versions: + - "< 2.1.0" + patched_versions: + - "~> 2.1.3" + - ">= 2.2.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2008-7248 + - https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1 + - https://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en + - https://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html + - https://github.com/advisories/GHSA-8fqx-7pv4-3jwm + - https://access.redhat.com/security/cve/CVE-2008-7248 + - https://bugzilla.redhat.com/show_bug.cgi?id=544329 + - https://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/ + - https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html + - https://www.openwall.com/lists/oss-security/2009/11/28/1 + - https://www.openwall.com/lists/oss-security/2009/12/02/2 + - http://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a + - http://github.com/rails/rails/commit/f1ad8b48aae3ee26613b3e77bc0056e120096846 + - https://rubygems.org/gems/rails/versions/2.1.2 + - https://rubygems.org/gems/rails/versions/2.1.2 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-2422.md b/advisories/_posts/2017-10-24-CVE-2009-2422.md new file mode 100644 index 00000000..8da88bda --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-2422.md @@ -0,0 +1,36 @@ +--- +layout: advisory +title: 'CVE-2009-2422 (rails): High severity vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2009-2422 + ghsa: rxq3-gm4p-5fj4 + url: http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest + title: High severity vulnerability that affects rails + date: 2017-10-24 + description: | + The example code for the digest authentication functionality + (http_authentication.rb) in Ruby on Rails before 2.3.3 defines + an authenticate_or_request_with_http_digest block that returns + nil instead of false when the user does not exist, which allows + context-dependent attackers to bypass authentication for + applications that are derived from this example by sending an + invalid username without a password. + cvss_v2: 7.5 + patched_versions: + - ">= 2.3.3" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-2422 + - http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest + - https://exchange.xforce.ibmcloud.com/vulnerabilities/51528 + - https://github.com/advisories/GHSA-rxq3-gm4p-5fj4 + - https://lists.apple.com/archives/security-announce/2010/Mar/msg00001.html + - http://support.apple.com/kb/HT4077 + - http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-3009.md b/advisories/_posts/2017-10-24-CVE-2009-3009.md new file mode 100644 index 00000000..727d7c50 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-3009.md @@ -0,0 +1,42 @@ +--- +layout: advisory +title: 'CVE-2009-3009 (activesupport): Moderate severity XSS vulnerability that affects + rails' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2009-3009 + osvdb: 57666 + ghsa: 8qrh-h9m2-5fvf + url: http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails + title: Moderate severity XSS vulnerability that affects rails + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before + 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary + web script or HTML by placing malformed Unicode strings into a form helper. + + 9/4/2009 url mentions patches for 2.0, 2.1, 2.2, and 2.3 series. + unaffected_versions: + - "< 2.0.0" + patched_versions: + - "~> 2.2.3" + - ">= 2.3.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-3009 + - http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails + - https://groups.google.com/g/rubyonrails-security/c/SKs_SiwWGQ8/m/tNHhlHfNV38J + - http://www.osvdb.org/57666 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/53036 + - https://github.com/advisories/GHSA-8qrh-h9m2-5fvf + - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063 + - https://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html + - http://support.apple.com/kb/HT4077 + - https://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html + - http://www.debian.org/security/2009/dsa-1887 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-3086.md b/advisories/_posts/2017-10-24-CVE-2009-3086.md new file mode 100644 index 00000000..0efbb894 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-3086.md @@ -0,0 +1,43 @@ +--- +layout: advisory +title: 'CVE-2009-3086 (activesupport): actionpack and activesupport vulnerable to + information leaks' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2009-3086 + ghsa: fg9w-g6m4-557j + url: http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails + title: actionpack and activesupport vulnerable to information leaks + date: 2017-10-24 + description: | + A certain algorithm in Ruby on Rails 2.1.0 through 2.2.2, and 2.3.x + before 2.3.4, leaks information about the complexity of message-digest + signature verification in the cookie store, which might allow remote + attackers to forge a digest via multiple attempts. + cvss_v2: 5.0 + unaffected_versions: + - "< 2.1.0" + patched_versions: + - "~> 2.2.3" + - ">= 2.3.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-3086 + - http://weblog.rubyonrails.org/2009/9/4/timing-weakness-in-ruby-on-rails + - https://github.com/advisories/GHSA-fg9w-g6m4-557j + - http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html + - http://www.debian.org/security/2011/dsa-2260 + - https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2009-3086.yml + - https://github.com/rails/rails/commit/1f07a89c5946910fc28ea5ccd1da6af8a0f972a0 + - https://github.com/rails/rails/commit/674f780d59a5a7ec0301755d43a7b277a3ad2978 + - https://github.com/rails/rails/commit/d460c9a25560f43e7c3789abadf7b455053eb686 + - https://web.archive.org/web/20090906010200/http://www.vupen.com/english/advisories/2009/2544 + - https://web.archive.org/web/20090907001716/http://secunia.com/advisories/36600 + - https://web.archive.org/web/20200229150042/http://www.securityfocus.com/bid/37427 + - https://github.com/advisories/GHSA-fg9w-g6m4-557j +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-3287.md b/advisories/_posts/2017-10-24-CVE-2009-3287.md new file mode 100644 index 00000000..96917897 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-3287.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2009-3287 (thin): High severity vulnerability that affects thin' +comments: false +categories: +- thin +advisory: + gem: thin + cve: 2009-3287 + ghsa: j24p-r6wx-r79w + url: http://github.com/macournoyer/thin/blob/master/CHANGELOG + title: High severity vulnerability that affects thin + date: 2017-10-24 + description: | + lib/thin/connection.rb in Thin web server before 1.2.4 relies on the + X-Forwarded-For header to determine the IP address of the client, + which allows remote attackers to spoof the IP address and hide + activities via a modified X-Forwarded-For header. + cvss_v2: 7.5 + patched_versions: + - ">= 1.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-3287 + - http://github.com/macournoyer/thin/blob/master/CHANGELOG + - http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a + - https://github.com/advisories/GHSA-j24p-r6wx-r79w + - http://www.openwall.com/lists/oss-security/2009/09/12/1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-4214.md b/advisories/_posts/2017-10-24-CVE-2009-4214.md new file mode 100644 index 00000000..95552320 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-4214.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2009-4214 (rails): Moderate severity XSS vulnerability that affects rails' +comments: false +categories: +- rails +- rails +advisory: + gem: rails + framework: rails + cve: 2009-4214 + ghsa: 9p3v-wf2w-v29c + url: http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released + title: Moderate severity XSS vulnerability that affects rails + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in the strip_tags function + in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote + attackers to inject arbitrary web script or HTML via vectors involving + non-printing ASCII characters,related to HTML::Tokenizer and + actionpack/lib/action_controller/vendor/html-scanner/html/node.rb. + cvss_v2: 4.3 + patched_versions: + - "~> 2.2.2" + - ">= 2.3.5" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-4214 + - http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released + - https://groups.google.com/g/rubyonrails-security/c/TU9x8q70wKs + - http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5 + - https://github.com/advisories/GHSA-9p3v-wf2w-v29c + - http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html + - http://support.apple.com/kb/HT4077 + - http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.htm + - http://www.debian.org/security/2011/dsa-2260 + - http://www.debian.org/security/2011/dsa-2301 + - http://www.openwall.com/lists/oss-security/2009/11/27/2 + - http://www.openwall.com/lists/oss-security/2009/12/08/3 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2009-4492.md b/advisories/_posts/2017-10-24-CVE-2009-4492.md new file mode 100644 index 00000000..4e0638de --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2009-4492.md @@ -0,0 +1,36 @@ +--- +layout: advisory +title: 'CVE-2009-4492 (webrick): WEBrick Improper Input Validation vulnerability' +comments: false +categories: +- webrick +advisory: + gem: webrick + cve: 2009-4492 + ghsa: 6mq2-37j5-w6r6 + url: https://github.com/advisories/GHSA-6mq2-37j5-w6r6 + title: WEBrick Improper Input Validation vulnerability + date: 2017-10-24 + description: | + WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel + 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file + without sanitizing non-printable characters, which might allow remote attackers + to modify a window's title, or possibly execute arbitrary commands or overwrite + files, via an HTTP request containing an escape sequence for a terminal emulator. + cvss_v2: 7.5 + patched_versions: + - ">= 1.4.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2009-4492 + - https://github.com/advisories/GHSA-6mq2-37j5-w6r6 + - http://www.redhat.com/support/errata/RHSA-2011-0908.html + - http://www.redhat.com/support/errata/RHSA-2011-0909.html + - http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection + - http://www.ush.it/team/ush/hack_httpd_escape/adv.txt + - https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089 + - https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949 + - https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429 + - https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded + - https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2010-3933.md b/advisories/_posts/2017-10-24-CVE-2010-3933.md new file mode 100644 index 00000000..8efe13cb --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2010-3933.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2010-3933 (activerecord): Security Vulnerability in Nested Attributes + code in Ruby On Rails 2.3.9 and 3.0.0' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2010-3933 + ghsa: gjxw-5w2q-7grf + url: http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0 + title: Security Vulnerability in Nested Attributes code in Ruby On Rails 2.3.9 and + 3.0.0 + date: 2017-10-24 + description: | + Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested + attributes, which allows remote attackers to modify arbitrary + records by changing the names of parameters for form inputs. + + Patches are available for 2.3 and 3.0 series. + cvss_v2: 6.4 + unaffected_versions: + - "< 2.3.9" + patched_versions: + - "~> 2.3.9" + - ">= 3.0.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2010-3933 + - http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0 + - https://github.com/advisories/GHSA-gjxw-5w2q-7grf + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/41930 + - https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1024624 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2010-5312.md b/advisories/_posts/2017-10-24-CVE-2010-5312.md new file mode 100644 index 00000000..b31a0cb9 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2010-5312.md @@ -0,0 +1,51 @@ +--- +layout: advisory +title: 'CVE-2010-5312 (jquery-ui-rails): Cross-site Scripting in jquery-ui' +comments: false +categories: +- jquery-ui-rails +advisory: + gem: jquery-ui-rails + cve: 2010-5312 + ghsa: wcm2-9c89-wmfm + url: https://nvd.nist.gov/vuln/detail/CVE-2010-5312 + title: Cross-site Scripting in jquery-ui + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in + the Dialog widget in jQuery UI before 1.10.0 allows remote attackers + to inject arbitrary web script or HTML via the title option. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 4.0.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2010-5312 + - https://github.com/jquery-ui-rails/jquery-ui-rails/commit/61a8e3f50796118e9f49fbd224b67d4065b40c50 + - http://bugs.jqueryui.com/ticket/6016 + - https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3 + - https://security.netapp.com/advisory/ntap-20190416-0007 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/98696 + - https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f + - https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442 + - http://rhn.redhat.com/errata/RHSA-2015-0442.html + - http://rhn.redhat.com/errata/RHSA-2015-1462.html + - http://seclists.org/oss-sec/2014/q4/613 + - http://seclists.org/oss-sec/2014/q4/616 + - http://www.debian.org/security/2015/dsa-3249 + - https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc + - https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html + - https://www.drupal.org/sa-core-2022-002 + - https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f + - https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442 + - https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc + - https://lists.fedoraproject.org/archives/list/package-announce + - https://lists.fedoraproject.org/archives/list/package-announce + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/ + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/ + - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html + - https://web.archive.org/web/20150316023043/http://www.securityfocus.com/bid/71106 + - https://web.archive.org/web/20170316161850/http://www.securitytracker.com/id/1037035 + - https://github.com/advisories/GHSA-wcm2-9c89-wmfm +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-0446.md b/advisories/_posts/2017-10-24-CVE-2011-0446.md new file mode 100644 index 00000000..12ef97b1 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-0446.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2011-0446 (actionview): XSS vulnerabilities in the mail_to helper in rails/actionview' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2011-0446 + ghsa: 75w6-p6mg-vh8j + url: https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ + title: XSS vulnerabilities in the mail_to helper in rails/actionview + date: 2017-10-24 + description: | + Multiple cross-site scripting (XSS) vulnerabilities in the mail_to + helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when + javascript encoding is used, allow remote attackers to inject + arbitrary web script or HTML via a crafted (1) name or (2) email value. + cvss_v2: 4.3 + patched_versions: + - "~> 2.3.11" + - ">= 3.0.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0446 + - https://groups.google.com/g/rubyonrails-security/c/8CpI7egxX4E/m/SmtqtyOKWzYJ + - https://github.com/advisories/GHSA-75w6-p6mg-vh8j + - http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html + - http://www.debian.org/security/2011/dsa-2247 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666 + - https://web.archive.org/web/20201208053819/http://www.securitytracker.com/id?1025064 + - https://web.archive.org/web/20210121211512/http://www.securityfocus.com/bid/46291 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-0447.md b/advisories/_posts/2017-10-24-CVE-2011-0447.md new file mode 100644 index 00000000..22018235 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-0447.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2011-0447 (actionpack): CSRF Protection Bypass in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-0447 + ghsa: 24fg-p96v-hxh8 + url: http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails + title: CSRF Protection Bypass in Ruby on Rails + date: 2017-10-24 + description: | + Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and + 3.x before 3.0.4, does not properly validate HTTP requests that + contain an X-Requested-With header, which makes it easier for + remote attackers to conduct cross-site request forgery (CSRF) + attacks via forged (1) AJAX or (2) API requests that leverage + "combinations of browser plugins and HTTP redirects," + a related issue to CVE-2011-0696. + cvss_v2: 6.8 + unaffected_versions: + - "< 2.1.0" + patched_versions: + - "~> 2.3.11" + - ">= 3.0.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0447 + - http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails + - https://groups.google.com/g/rubyonrails-security/c/LZWjzCPgNmU/m/HBgNjGahLsIJ + - https://github.com/advisories/GHSA-24fg-p96v-hxh8 + - http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html + - https://bugzilla.redhat.com/show_bug.cgi?id=677631 + - http://www.debian.org/security/2011/dsa-2247 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43274 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43666 + - https://web.archive.org/web/20210121211512/http://www.securityfocus.com/bid/46291 + - https://web.archive.org/web/20201208053819/http://www.securitytracker.com/id?1025060 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-0448.md b/advisories/_posts/2017-10-24-CVE-2011-0448.md new file mode 100644 index 00000000..b833860f --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-0448.md @@ -0,0 +1,36 @@ +--- +layout: advisory +title: 'CVE-2011-0448 (activerecord): Potential SQL Injection with limit in rails/activerecord' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2011-0448 + ghsa: jmm9-2p29-vh2w + url: http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4 + title: Potential SQL Injection with limit in rails/activerecord + date: 2017-10-24 + description: | + Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to + the limit function specify integer values, which makes it easier + for remote attackers to conduct SQL injection attacks via a + non-numeric argument. + cvss_v2: 7.5 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 2.3.11" + - "> 3.0.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0448 + - http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4 + - https://groups.google.com/g/rubyonrails-security/c/tliQLPa_Tu0/m/rUCt9kyGGU4J + - https://github.com/advisories/GHSA-jmm9-2p29-vh2w + - http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43278 + - https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1025063 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-0449.md b/advisories/_posts/2017-10-24-CVE-2011-0449.md new file mode 100644 index 00000000..8b87ed39 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-0449.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2011-0449 (actionpack): Filter Problems on Case-Insensitive Filesystems + in rails/actionpack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-0449 + ghsa: 4ww3-3rxj-8v6q + url: http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4 + title: Filter Problems on Case-Insensitive Filesystems in rails/actionpack + date: 2017-10-24 + description: | + actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x + before 3.0.4, when a case-insensitive filesystem is used, does not + properly implement filters associated with the list of available + templates, which allows remote attackers to bypass intended access + restrictions via an action name that uses an unintended case for + alphabetic characters. + cvss_v2: 7.5 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - ">= 3.0.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0449 + - http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4 + - https://github.com/rails/rails/commit/6f80224057803f85b3f448936aae89e742452c3b + - https://groups.google.com/g/rubyonrails-security/c/Ni8fvBdhszY/m/T1vfhC5bNAQJ + - https://github.com/advisories/GHSA-4ww3-3rxj-8v6q + - http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html + - https://bugzilla.redhat.com/show_bug.cgi?id=679351 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/43278 + - https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1025061 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-2197.md b/advisories/_posts/2017-10-24-CVE-2011-2197.md new file mode 100644 index 00000000..9384d329 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-2197.md @@ -0,0 +1,41 @@ +--- +layout: advisory +title: 'CVE-2011-2197 (activesupport): Potential XSS Vulnerability in Ruby on Rails + Applications' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2011-2197 + ghsa: v9v4-7jp6-8c73 + url: http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications + title: Potential XSS Vulnerability in Ruby on Rails Applications + date: 2017-10-24 + description: | + The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x + before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does + not properly handle mutation of safe buffers, which makes it easier + for remote attackers to conduct XSS attacks via crafted strings to an + application that uses a problematic string method, as demonstrated + by the sub method. + cvss_v2: 4.3 + patched_versions: + - "~> 2.3.12" + - ">= 3.0.8" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2197 + - http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications + - https://github.com/rails/rails/commit/53a2c0baf2b128dd4808eca313256f6f4bb8c4cd + - https://github.com/rails/rails/commit/ed3796434af6069ced6a641293cf88eef3b284da + - https://groups.google.com/g/rubyonrails-security/c/LlFuesyWxPs/m/1OBxRA1gO2YJ + - https://gist.github.com/NZKoz/b2ceb626fc2bcdfe497f + - https://github.com/advisories/GHSA-v9v4-7jp6-8c73 + - http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html + - http://openwall.com/lists/oss-security/2011/06/09/2 + - http://openwall.com/lists/oss-security/2011/06/13/9 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-2929.md b/advisories/_posts/2017-10-24-CVE-2011-2929.md new file mode 100644 index 00000000..a46d8bee --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-2929.md @@ -0,0 +1,47 @@ +--- +layout: advisory +title: 'CVE-2011-2929 (actionpack): Filter Skipping Vulnerability in Ruby on Rails + 3.0/actionpack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-2929 + ghsa: r7q2-5gqg-6c7q + url: https://rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + title: Filter Skipping Vulnerability in Ruby on Rails 3.0/actionpack + date: 2017-10-24 + description: | + The template selection functionality in + actionpack/lib/action_view/template/resolver.rb in Ruby on Rails + 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly + handle glob characters, which allows remote attackers to render + arbitrary views via a crafted URL, related to a + "filter skipping vulnerability." + cvss_v2: 5.0 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 3.0.10" + - "~> 3.1.0.rc6" + - ">= 3.1.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2929 + - http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + - https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552 + - https://groups.google.com/g/rubyonrails-security/c/NCCsca7TEtY/m/Ya9-T266u8sJ + - https://bugzilla.redhat.com/show_bug.cgi?id=731432 + - https://github.com/advisories/GHSA-r7q2-5gqg-6c7q + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html + - http://www.openwall.com/lists/oss-security/2011/08/17/1 + - http://www.openwall.com/lists/oss-security/2011/08/19/11 + - http://www.openwall.com/lists/oss-security/2011/08/20/1 + - http://www.openwall.com/lists/oss-security/2011/08/22/13 + - http://www.openwall.com/lists/oss-security/2011/08/22/14 + - http://www.openwall.com/lists/oss-security/2011/08/22/5 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-2930.md b/advisories/_posts/2017-10-24-CVE-2011-2930.md new file mode 100644 index 00000000..4268137e --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-2930.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2011-2930 (activerecord): SQL Injection Vulnerability in quote_table_name + in rails/activerecord' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2011-2930 + ghsa: h6w6-xmqv-7q78 + url: http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + title: SQL Injection Vulnerability in quote_table_name in rails/activerecord + date: 2017-10-24 + description: | + Multiple SQL injection vulnerabilities in the + quote_table_name method in the ActiveRecord adapters in + activerecord/lib/active_record/connection_adapters in Ruby on Rails + before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow + remote attackers to execute arbitrary SQL commands via a crafted column name. + cvss_v2: 7.5 + patched_versions: + - "~> 2.3.13" + - "~> 3.0.10" + - "~> 3.1.0.rc5" + - ">= 3.1.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2930 + - http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + - https://groups.google.com/g/rubyonrails-security/c/ah5HN0S8OJs/m/MN35sDZdqLEJ + - https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85 + - https://github.com/advisories/GHSA-h6w6-xmqv-7q78 + - https://bugzilla.redhat.com/show_bug.cgi?id=731438 + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html + - http://www.debian.org/security/2011/dsa-2301 + - http://www.openwall.com/lists/oss-security/2011/08/17/1 + - http://www.openwall.com/lists/oss-security/2011/08/19/11 + - http://www.openwall.com/lists/oss-security/2011/08/20/1 + - http://www.openwall.com/lists/oss-security/2011/08/22/13 + - http://www.openwall.com/lists/oss-security/2011/08/22/14 + - http://www.openwall.com/lists/oss-security/2011/08/22/5 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-2931.md b/advisories/_posts/2017-10-24-CVE-2011-2931.md new file mode 100644 index 00000000..2ee20b81 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-2931.md @@ -0,0 +1,48 @@ +--- +layout: advisory +title: 'CVE-2011-2931 (actionpack): XSS Vulnerability in strip_tags helper in rails/actionpack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-2931 + ghsa: v5jg-558j-q67c + url: http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + title: XSS Vulnerability in strip_tags helper in rails/actionpack + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in the strip_tags helper + in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb + in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x + before 3.1.0.rc5 allows remote attackers to inject arbitrary web + script or HTML via a tag with an invalid name. + cvss_v2: 4.3 + unaffected_versions: + - "< 2.0.0" + - "< 3.0.0" + patched_versions: + - "~> 2.3.13" + - ">= 3.0.10" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2931 + - http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + - https://groups.google.com/g/rubyonrails-security/c/K5EwdJt06hI + - https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a + - https://bugzilla.redhat.com/show_bug.cgi?id=731436 + - https://github.com/advisories/GHSA-v5jg-558j-q67c + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html + - http://www.debian.org/security/2011/dsa-2301 + - http://www.openwall.com/lists/oss-security/2011/08/17/1 + - http://www.openwall.com/lists/oss-security/2011/08/19/11 + - http://www.openwall.com/lists/oss-security/2011/08/20/1 + - http://www.openwall.com/lists/oss-security/2011/08/22/13 + - http://www.openwall.com/lists/oss-security/2011/08/22/14 + - http://www.openwall.com/lists/oss-security/2011/08/22/5 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/45921 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-2932.md b/advisories/_posts/2017-10-24-CVE-2011-2932.md new file mode 100644 index 00000000..a7a58e18 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-2932.md @@ -0,0 +1,47 @@ +--- +layout: advisory +title: 'CVE-2011-2932 (activesupport): UTF-8 escaping vulnerability in rails/activesupport' +comments: false +categories: +- activesupport +- rails +advisory: + gem: activesupport + framework: rails + cve: 2011-2932 + ghsa: 9fh3-vh3h-q4g3 + url: http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + title: UTF-8 escaping vulnerability in rails/activesupport + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in + activesupport/lib/active_support/core_ext/string/output_safety.rb + in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and + 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary + web script or HTML via a malformed Unicode string, related to + a "UTF-8 escaping vulnerability." + cvss_v2: 4.3 + patched_versions: + - "~> 2.3.13" + - "~> 3.0.10" + - "~> 3.1.0.rc5" + - ">= 3.1.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2932 + - http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6 + - https://groups.google.com/g/rubyonrails-security/c/Vr_7WSOrEZU/m/IZ_bc5d00vEJ + - https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd + - https://bugzilla.redhat.com/show_bug.cgi?id=731435 + - https://github.com/advisories/GHSA-9fh3-vh3h-q4g3 + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html + - http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html + - http://www.openwall.com/lists/oss-security/2011/08/17/1 + - http://www.openwall.com/lists/oss-security/2011/08/19/11 + - http://www.openwall.com/lists/oss-security/2011/08/20/1 + - http://www.openwall.com/lists/oss-security/2011/08/22/13 + - http://www.openwall.com/lists/oss-security/2011/08/22/14 + - http://www.openwall.com/lists/oss-security/2011/08/22/5 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/45917 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-3187.md b/advisories/_posts/2017-10-24-CVE-2011-3187.md new file mode 100644 index 00000000..181657f8 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-3187.md @@ -0,0 +1,41 @@ +--- +layout: advisory +title: 'CVE-2011-3187 (actionpack): Ruby on rails 3.0.5 Remote_IP.rb Input Validation + in rails/actionpack' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-3187 + ghsa: 3vfw-7rcp-3xgm + url: http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html + title: Ruby on rails 3.0.5 Remote_IP.rb Input Validation in rails/actionpack + date: 2017-10-24 + description: | + The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb + in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header + in requests from IP addresses on a Class C network, which might allow + remote attackers to inject arbitrary text into log files or bypass + intended address parsing via a crafted header. + cvss_v2: 4.3 + unaffected_versions: + - "< 2.3.0" + patched_versions: + - ">= 2.3.13" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-3187 + - http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html + - https://github.com/advisories/GHSA-3vfw-7rcp-3xgm + - https://www.rapid7.com/db/vulnerabilities/ruby_on_rails-cve-2011-3187 + - http://www.openwall.com/lists/oss-security/2011/08/17/1 + - http://www.openwall.com/lists/oss-security/2011/08/19/11 + - http://www.openwall.com/lists/oss-security/2011/08/20/1 + - http://www.openwall.com/lists/oss-security/2011/08/22/13 + - http://www.openwall.com/lists/oss-security/2011/08/22/14 + - http://www.openwall.com/lists/oss-security/2011/08/22/5 + - https://web.archive.org/web/20111209181000/http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html +--- diff --git a/advisories/_posts/2017-10-24-CVE-2011-4319.md b/advisories/_posts/2017-10-24-CVE-2011-4319.md new file mode 100644 index 00000000..9381c5fb --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2011-4319.md @@ -0,0 +1,51 @@ +--- +layout: advisory +title: 'CVE-2011-4319 (actionpack): Cross-site Scripting vulnerability in i18n translations + helper method' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2011-4319 + osvdb: 77199 + ghsa: xxr8-833v-c7wc + url: http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released + title: Cross-site Scripting vulnerability in i18n translations helper method + date: 2017-10-24 + description: | + A cross-site scripting (XSS) flaw was found in the way the 'translate' helper + method of the Ruby on Rails performed HTML escaping of interpolated user + input, when interpolation in combination with HTML-safe translations were + used. A remote attacker could use this flaw to execute arbitrary HTML or web + script by providing a specially-crafted input to Ruby on Rails application, + using the ActionPack module and its 'translate' helper method without explicit + (application specific) sanitization of user provided input. + + Cross-site scripting (XSS) vulnerability in the i18n translations helper + method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, + and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote + attackers to inject arbitrary web script or HTML via vectors related + to a translations string whose name ends with an "html" substring. + cvss_v2: 4.3 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - "~> 3.0.11" + - ">= 3.1.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-4319 + - http://weblog.rubyonrails.org/2011/11/18/rails-3-0-11-has-been-released + - http://weblog.rubyonrails.org/2011/11/18/rails-3-1-2-has-been-released + - https://groups.google.com/g/rubyonrails-security/c/K2HXD7c8fMU + - https://groups.google.com/g/rubyonrails-security/c/K2HXD7c8fMU/m/gt22xPskXMYJ + - https://github.com/advisories/GHSA-xxr8-833v-c7wc + - http://osvdb.org/77199 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/71364 + - http://openwall.com/lists/oss-security/2011/11/18/8 + - https://web.archive.org/web/20210121211512/http://www.securityfocus.com/bid/50722 + - https://web.archive.org/web/20201208053819/http://www.securitytracker.com/id?1026342 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-1989.md b/advisories/_posts/2017-10-24-CVE-2012-1989.md new file mode 100644 index 00000000..5b190523 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-1989.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2012-1989 (puppet): Arbitrary File Write Access in Puppet' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-1989 + ghsa: c5qq-g673-5p49 + url: https://www.puppet.com/security/cve/cve-2012-1989-arbitrary-file-write-access + title: Arbitrary File Write Access in Puppet + date: 2017-10-24 + description: | + telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise + (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users + to overwrite arbitrary files via a symlink attack on the + NET::Telnet connection log (/tmp/out.log). + cvss_v2: 3.6 + unaffected_versions: + - "< 2.7.1" + patched_versions: + - "~> 2.5.1" + - ">= 2.7.13" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-1989 + - https://www.puppet.com/security/cve/cve-2012-1989-arbitrary-file-write-access + - https://github.com/advisories/GHSA-c5qq-g673-5p49 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/74797 + - https://security.gentoo.org/glsa/201208-02 + - http://ubuntu.com/usn/usn-1419-1 + - http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html + - https://web.archive.org/web/20210121211512/http://www.securityfocus.com/bid/52975 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/49136 + - https://web.archive.org/web/20111225083933/http://secunia.com/advisories/48748 + - https://web.archive.org/web/20121025194938/http://secunia.com/advisories/48743 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-2660.md b/advisories/_posts/2017-10-24-CVE-2012-2660.md new file mode 100644 index 00000000..2163ab44 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-2660.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2012-2660 (actionpack): Unsafe Query Generation Risk in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-2660 + ghsa: hgpp-pp89-4fgf + url: https://groups.google.com/g/rubyonrails-security/c/8SA-M3as7A8/m/Mr9fi9X4kNgJ + title: Unsafe Query Generation Risk in Ruby on Rails + date: 2017-10-24 + description: | + actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails + before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not + properly consider differences in parameter handling between the + Active Record component and the Rack interface, which allows remote + attackers to bypass intended database-query restrictions and perform + NULL checks via a crafted request, as demonstrated by certain + "[nil]" values, a related issue to CVE-2012-2694. + cvss_v2: 6.4 + patched_versions: + - "~> 3.0.13" + - "~> 3.1.5" + - ">= 3.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-2660 + - https://groups.google.com/g/rubyonrails-security/c/8SA-M3as7A8/m/Mr9fi9X4kNgJ + - https://github.com/advisories/GHSA-hgpp-pp89-4fgf + - http://rhn.redhat.com/errata/RHSA-2013-0154.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html + - http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-2694.md b/advisories/_posts/2017-10-24-CVE-2012-2694.md new file mode 100644 index 00000000..2b1fab04 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-2694.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2012-2694 (actionpack): Unsafe Query Generation Risk in Ruby on Rails' +comments: false +categories: +- actionpack +- rails +advisory: + gem: actionpack + framework: rails + cve: 2012-2694 + ghsa: q34c-48gc-m9g8 + url: https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ + title: Unsafe Query Generation Risk in Ruby on Rails + date: 2017-10-24 + description: | + actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails + before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not + properly consider differences in parameter handling between the + Active Record component and the Rack interface, which allows remote + attackers to bypass intended database-query restrictions and perform + NULL checks via a crafted request, as demonstrated by certain + "['xyz', nil]" values, a related issue to CVE-2012-2660. + cvss_v2: 4.3 + patched_versions: + - "~> 3.0.14" + - "~> 3.1.6" + - ">= 3.2.6" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-2694 + - https://groups.google.com/g/rubyonrails-security/c/jILZ34tAHF4/m/7x0hLH-o0-IJ + - https://github.com/advisories/GHSA-q34c-48gc-m9g8 + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00017.html + - http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html + - http://rhn.redhat.com/errata/RHSA-2013-0154.html +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-2695.md b/advisories/_posts/2017-10-24-CVE-2012-2695.md new file mode 100644 index 00000000..e5445cd4 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-2695.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2012-2695 (activerecord): SQL Injection Vulnerability in Ruby on Rails' +comments: false +categories: +- activerecord +- rails +advisory: + gem: activerecord + framework: rails + cve: 2012-2695 + ghsa: 76wq-xw4h-f8wj + url: https://groups.google.com/g/rubyonrails-security/c/l4L0TEVAz1k/m/Vr84sD9B464J + title: SQL Injection Vulnerability in Ruby on Rails + date: 2017-10-24 + description: | + The Active Record component in Ruby on Rails before 3.0.14, 3.1.x + before 3.1.6, and 3.2.x before 3.2.6 does not properly implement + the passing of request data to a where method in an ActiveRecord + class, which allows remote attackers to conduct certain SQL + injection attacks via nested query parameters that leverage + improper handling of nested hashes, a related issue to CVE-2012-2661. + cvss_v2: 7.5 + patched_versions: + - "~> 3.0.14" + - "~> 3.1.6" + - ">= 3.2.6" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-2695 + - https://groups.google.com/g/rubyonrails-security/c/l4L0TEVAz1k/m/Vr84sD9B464J + - https://github.com/advisories/GHSA-76wq-xw4h-f8wj + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html + - http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html + - http://rhn.redhat.com/errata/RHSA-2013-0154.html +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-3408.md b/advisories/_posts/2017-10-24-CVE-2012-3408.md new file mode 100644 index 00000000..b16e0efa --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-3408.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2012-3408 (puppet): Agent Imprersonation in Puppet' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-3408 + ghsa: vxf6-w9mp-95hm + url: https://www.puppet.com/security/cve/cve-2012-3408-agent-impersonation + title: Agent Imprersonation in Puppet + date: 2017-10-24 + description: | + lib/puppet/network/authstore.rb in Puppet before 2.7.18, and + Puppet Enterprise before 2.5.2, supports use of IP addresses in + certnames without warning of potential risks, which might allow + remote attackers to spoof an agent by acquiring a previously + used IP address. + cvss_v2: 2.6 + patched_versions: + - ">= 2.7.18" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-3408 + - https://www.puppet.com/security/cve/cve-2012-3408-agent-impersonation + - https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd + - https://github.com/advisories/GHSA-vxf6-w9mp-95hm + - https://bugzilla.redhat.com/show_bug.cgi?id=839166 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-3865.md b/advisories/_posts/2017-10-24-CVE-2012-3865.md new file mode 100644 index 00000000..3e3bb8e9 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-3865.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2012-3865 (puppet): Arbitrary file delete/D.O.S on Puppet Master' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-3865 + ghsa: g89m-3wjw-h857 + url: https://www.puppet.com/security/cve/overview-cve-2012-3865-arbitrary-file-delete/dos-puppet-master + title: Arbitrary file delete/D.O.S on Puppet Master + date: 2017-10-24 + description: | + Directory traversal vulnerability in lib/puppet/reports/store.rb + in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet + Enterprise before 2.5.2, when Delete is enabled in auth.conf, + allows remote authenticated users to delete arbitrary files on + the puppet master server via a .. (dot dot) in a node name. + cvss_v2: 3.5 + patched_versions: + - "~> 2.6.17" + - ">= 2.7.18" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-3865 + - https://www.puppet.com/security/cve/overview-cve-2012-3865-arbitrary-file-delete/dos-puppet-master + - https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f + - https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6 + - https://github.com/advisories/GHSA-g89m-3wjw-h857 + - https://bugzilla.redhat.com/show_bug.cgi?id=839131 + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html + - http://www.debian.org/security/2012/dsa-2511 + - http://www.ubuntu.com/usn/USN-1506-1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-3866.md b/advisories/_posts/2017-10-24-CVE-2012-3866.md new file mode 100644 index 00000000..edd2ac58 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-3866.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2012-3866 (puppet): last_run_report.yaml is world readable' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-3866 + ghsa: 8jxj-9r5f-w3m2 + url: https://www.puppet.com/security/cve/cve-2012-3866-lastrunreportyaml-world-readable + title: last_run_report.yaml is world readable + date: 2017-10-24 + description: | + lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet + Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, + which allows local users to obtain sensitive configuration information + by leveraging access to the puppet master server to read this file. + unaffected_versions: + - "< 2.7.0" + patched_versions: + - ">= 2.7.18" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-3866 + - https://www.puppet.com/security/cve/cve-2012-3866-lastrunreportyaml-world-readable + - https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f + - https://github.com/advisories/GHSA-8jxj-9r5f-w3m2 + - https://bugzilla.redhat.com/show_bug.cgi?id=839135 + - http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html + - http://www.debian.org/security/2012/dsa-2511 + - http://www.ubuntu.com/usn/USN-1506-1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-3867.md b/advisories/_posts/2017-10-24-CVE-2012-3867.md new file mode 100644 index 00000000..6fecc12f --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-3867.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2012-3867 (puppet): Insufficient input validation' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2012-3867 + ghsa: q44r-f2hm-v76v + url: https://www.puppet.com/security/cve/cve-2012-3867-insufficient-input-validation + title: Insufficient input validation + date: 2017-10-24 + description: | + lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and + 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not + properly restrict the characters in the Common Name field of a + Certificate Signing Request (CSR), which makes it easier for + user-assisted remote attackers to trick administrators into + signing a crafted agent certificate via ANSI control sequences. + cvss_v2: 4.3 + patched_versions: + - "~> 2.6.17" + - ">= 2.7.18" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-3867 + - https://www.puppet.com/security/cve/cve-2012-3867-insufficient-input-validation + - https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640 + - https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50 + - https://github.com/advisories/GHSA-q44r-f2hm-v76v + - https://bugzilla.redhat.com/show_bug.cgi?id=839158 + - http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html + - http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html + - http://www.debian.org/security/2012/dsa-2511 + - http://www.ubuntu.com/usn/USN-1506-1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-6662.md b/advisories/_posts/2017-10-24-CVE-2012-6662.md new file mode 100644 index 00000000..a0d94223 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-6662.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2012-6662 (jquery-ui-rails): Moderate severity vulnerability that affects + jquery-ui' +comments: false +categories: +- jquery-ui-rails +advisory: + gem: jquery-ui-rails + cve: 2012-6662 + ghsa: qqxp-xp9v-vvx6 + url: https://nvd.nist.gov/vuln/detail/CVE-2012-6662 + title: Moderate severity vulnerability that affects jquery-ui + date: 2017-10-24 + description: | + Cross-site scripting (XSS) vulnerability in the default content option + in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before + 1.10.0 allows remote attackers to inject arbitrary web script or + HTML via the title attribute, which is not properly handled in the + autocomplete combo box demo. + cvss_v2: 4.3 + patched_versions: + - ">= 4.0.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-6662 + - https://github.com/jquery-ui-rails/jquery-ui-rails/commit/61a8e3f50796118e9f49fbd224b67d4065b40c50 + - https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde + - https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e + - http://bugs.jqueryui.com/ticket/8859 + - http://bugs.jqueryui.com/ticket/8861 + - https://github.com/jquery/jquery/issues/2432 + - https://exchange.xforce.ibmcloud.com/vulnerabilities/98697 + - http://rhn.redhat.com/errata/RHSA-2015-0442.html + - http://rhn.redhat.com/errata/RHSA-2015-1462.html + - http://seclists.org/oss-sec/2014/q4/613 + - http://seclists.org/oss-sec/2014/q4/616 + - http://www.securityfocus.com/bid/71107 + - https://github.com/advisories/GHSA-qqxp-xp9v-vvx6 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2012-6684.md b/advisories/_posts/2017-10-24-CVE-2012-6684.md new file mode 100644 index 00000000..e7aa860b --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2012-6684.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2012-6684 (redcloth): RedCloth Cross-site Scripting vulnerability' +comments: false +categories: +- redcloth +advisory: + gem: redcloth + cve: 2012-6684 + ghsa: r23g-3qw4-gfh2 + url: http://co3k.org/blog/redcloth-unfixed-xss-en + title: RedCloth Cross-site Scripting vulnerability + date: 2017-10-24 + description: Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 + for Ruby and earlier allows remote attackers to inject arbitrary web script or + HTML via a "javascript:" URI. + cvss_v2: 4.3 + patched_versions: + - ">= 4.3.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-6684 + - http://co3k.org/blog/redcloth-unfixed-xss-en + - https://gist.github.com/co3k/75b3cb416c342aa1414c + - https://github.com/jgarber/redcloth/commit/b24f03db023d1653d60dd33b28e09317cd77c6a0 + - https://github.com/advisories/GHSA-r23g-3qw4-gfh2 + - http://seclists.org/fulldisclosure/2014/Dec/50 + - http://www.debian.org/security/2015/dsa-3168 + - https://web.archive.org/web/20150128115714/http://jgarber.lighthouseapp.com/projects/13054-redcloth/tickets/243-xss +--- diff --git a/advisories/_posts/2017-10-24-CVE-2013-1655.md b/advisories/_posts/2017-10-24-CVE-2013-1655.md new file mode 100644 index 00000000..dc4acf7c --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2013-1655.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2013-1655 (puppet): Unauthenticated Remote Code Execution Vulnerability' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2013-1655 + ghsa: 574q-fxfj-wv6h + url: https://www.puppet.com/security/cve/cve-2013-1655-unauthenticated-remote-code-execution-vulnerability + title: Unauthenticated Remote Code Execution Vulnerability + date: 2017-10-24 + description: | + Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running + Ruby 1.9.3 or later, allows remote attackers to execute arbitrary + code via vectors related to "serialized attributes." + cvss_v2: 7.5 + unaffected_versions: + - "< 2.7.0" + patched_versions: + - "~> 2.7.21" + - ">= 3.1.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-1655 + - https://www.puppet.com/security/cve/cve-2013-1655-unauthenticated-remote-code-execution-vulnerability + - https://github.com/advisories/GHSA-574q-fxfj-wv6h + - http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html + - http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html + - http://ubuntu.com/usn/usn-1759-1 + - http://www.debian.org/security/2013/dsa-2643 + - https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2013-1655 + - https://web.archive.org/web/20210509162357/https://www.securityfocus.com/bid/46291 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2013-1812.md b/advisories/_posts/2017-10-24-CVE-2013-1812.md new file mode 100644 index 00000000..d51fd7ec --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2013-1812.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2013-1812 (ruby-openid): Vulnerable to XIE DoS attacks' +comments: false +categories: +- ruby-openid +advisory: + gem: ruby-openid + cve: 2013-1812 + ghsa: 6c8p-qphv-668v + url: https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md + title: Vulnerable to XIE DoS attacks + date: 2017-10-24 + description: | + The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID + providers to cause a denial of service (CPU consumption) via + (1) a large XRDS document or + (2) an XML Entity Expansion (XEE) attack. + cvss_v2: 4.3 + patched_versions: + - ">= 2.2.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-1812 + - https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md + - https://github.com/openid/ruby-openid/pull/43 + - https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed + - https://github.com/advisories/GHSA-6c8p-qphv-668v + - https://bugzilla.redhat.com/show_bug.cgi?id=918134 + - http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html + - http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html + - http://www.openwall.com/lists/oss-security/2013/03/03/8 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2013-3567.md b/advisories/_posts/2017-10-24-CVE-2013-3567.md new file mode 100644 index 00000000..49cc4db1 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2013-3567.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2013-3567 (puppet): Unauthenticated Remote Code Execution Vulnerability' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2013-3567 + ghsa: f7p5-w2cr-7cp7 + url: https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability + title: Unauthenticated Remote Code Execution Vulnerability + date: 2017-10-24 + description: | + Puppet 2.7.x before 2.7.22 and 3.2.x before 3.2.2, and Puppet + Enterprise before 2.8.2, deserializes untrusted YAML, which allows + remote attackers to instantiate arbitrary Ruby classes and execute + arbitrary code via a crafted REST API call. + cvss_v2: 7.5 + patched_versions: + - "~> 2.7.22" + - ">= 3.2.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-3567 + - https://www.puppet.com/security/cve/cve-2013-3567-unauthenticated-remote-code-execution-vulnerability + - https://github.com/advisories/GHSA-f7p5-w2cr-7cp7 + - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00002.html + - http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00019.html + - http://rhn.redhat.com/errata/RHSA-2013-1283.html + - http://rhn.redhat.com/errata/RHSA-2013-1284.html + - http://www.debian.org/security/2013/dsa-2715 + - http://www.ubuntu.com/usn/USN-1886-1 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2013-4761.md b/advisories/_posts/2017-10-24-CVE-2013-4761.md new file mode 100644 index 00000000..5f2677cc --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2013-4761.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2013-4761 (puppet): Puppet `resource_type` Remote Code Execution Vulnerability' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2013-4761 + ghsa: cj43-9h3w-v976 + url: https://www.puppet.com/security/cve/cve-2013-4761-resourcetype-remote-code-execution-vulnerability + title: Puppet `resource_type` Remote Code Execution Vulnerability + date: 2017-10-24 + description: | + Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and + 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before + 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute + arbitrary Ruby programs from the master via the resource_type + service. + + NOTE: this vulnerability can only be exploited using unspecified + "local file system access" to the Puppet Master. + cvss_v2: 5.1 + unaffected_versions: + - "< 2.7.0" + patched_versions: + - "~> 2.7.23" + - ">= 3.2.4" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2013-4761 + - https://www.puppet.com/security/cve/cve-2013-4761-resourcetype-remote-code-execution-vulnerability + - https://github.com/advisories/GHSA-cj43-9h3w-v976 + - http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00009.html + - http://rhn.redhat.com/errata/RHSA-2013-1283.html + - http://rhn.redhat.com/errata/RHSA-2013-1284.html + - http://www.debian.org/security/2013/dsa-2761 +--- diff --git a/advisories/_posts/2017-10-24-CVE-2014-0081.md b/advisories/_posts/2017-10-24-CVE-2014-0081.md new file mode 100644 index 00000000..cbdc5159 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2014-0081.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2014-0081 (rails): Rails vulnerable to Cross-site Scripting' +comments: false +categories: +- rails +advisory: + gem: rails + cve: 2014-0081 + ghsa: m46p-ggm5-5j83 + url: https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb + title: Rails vulnerable to Cross-site Scripting + date: 2017-10-24 + description: | + Multiple cross-site scripting (XSS) vulnerabilities in + "actionview/lib/action_view/helpers/number_helper.rb" + in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 + allow remote attackers to inject arbitrary web script or HTML via the + (1) format, (2) negative_format, or (3) units parameter to the + (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper. + cvss_v2: 4.3 + patched_versions: + - "~> 3.2.17" + - "~> 4.0.3" + - "~> 4.1.0.beta2" + - ">= 4.1.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-0081 + - http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html + - http://openwall.com/lists/oss-security/2014/02/18/8 + - http://rhn.redhat.com/errata/RHSA-2014-0215.html + - http://rhn.redhat.com/errata/RHSA-2014-0306.html + - https://web.archive.org/web/20140911141416/http://www.securitytracker.com/id/1029782 + - https://web.archive.org/web/20170307202606/http://www.securityfocus.com/bid/65647 + - https://github.com/advisories/GHSA-m46p-ggm5-5j83 + - https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb +--- diff --git a/advisories/_posts/2017-10-24-CVE-2014-3248.md b/advisories/_posts/2017-10-24-CVE-2014-3248.md new file mode 100644 index 00000000..0c790ee0 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2014-3248.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2014-3248 (puppet): Moderate severity vulnerability that affects facter, + hiera, mcollective-client, and puppet' +comments: false +categories: +- puppet +advisory: + gem: puppet + cve: 2014-3248 + ghsa: 92v7-pq4h-58j5 + url: https://github.com/advisories/GHSA-92v7-pq4h-58j5 + title: Moderate severity vulnerability that affects facter, hiera, mcollective-client, + and puppet + date: 2017-10-24 + description: | + Untrusted search path vulnerability in Puppet Enterprise 2.8 before 2.8.7, + Puppet before 2.7.26 and 3.x before 3.6.2, Facter 1.6.x and 2.x before 2.0.2, Hiera + before 1.3.4, and Mcollective before 2.5.2, when running with Ruby 1.9.1 or earlier, + allows local users to gain privileges via a Trojan horse file in the current working + directory, as demonstrated using (1) rubygems/defaults/operating_system.rb, (2) + Win32API.rb, (3) Win32API.so, (4) safe_yaml.rb, (5) safe_yaml/deep.rb, or (6) safe_yaml/deep.so; + or (7) operatingsystem.rb, (8) operatingsystem.so, (9) osfamily.rb, or (10) osfamily.so + in puppet/confine. + patched_versions: + - "~> 2.7.26" + - ">= 3.6.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-3248 + - https://github.com/advisories/GHSA-92v7-pq4h-58j5 + - http://puppetlabs.com/security/cve/cve-2014-3248 + - http://rowediness.com/2014/06/13/cve-2014-3248-a-little-problem-with-puppet/ + - http://secunia.com/advisories/59197 + - http://secunia.com/advisories/59200 + - http://www.securityfocus.com/bid/68035 + - https://github.com/rubysec/ruby-advisory-db/issues/238 + - https://sca.analysiscenter.veracode.com/vulnerability-database/security/elevation-privileges-untrusted-search/ruby/sid-1586/summary +--- diff --git a/advisories/_posts/2017-10-24-CVE-2016-7798.md b/advisories/_posts/2017-10-24-CVE-2016-7798.md new file mode 100644 index 00000000..9e486411 --- /dev/null +++ b/advisories/_posts/2017-10-24-CVE-2016-7798.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2016-7798 (openssl): Incorrect handling of initialization vector in the + GCM mode in OpenSSL' +comments: false +categories: +- openssl +advisory: + gem: openssl + cve: 2016-7798 + ghsa: 6h88-qjpv-p32m + url: https://github.com/ruby/openssl/issues/49 + title: Incorrect handling of initialization vector in the GCM mode in OpenSSL + date: 2017-10-24 + description: | + The openssl gem for Ruby uses the same initialization vector (IV) in + GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for + context-dependent attackers to bypass the encryption protection mechanism. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 2.0.0" +--- diff --git a/advisories/_posts/2017-10-27-CVE-2017-15928.md b/advisories/_posts/2017-10-27-CVE-2017-15928.md new file mode 100644 index 00000000..4813a1a5 --- /dev/null +++ b/advisories/_posts/2017-10-27-CVE-2017-15928.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2017-15928 (ox): ox ruby gem segmentation fault via parse_obj' +comments: false +categories: +- ox +advisory: + gem: ox + cve: 2017-15928 + ghsa: pjj4-w39g-pw54 + url: https://github.com/ohler55/ox/issues/194 + title: ox ruby gem segmentation fault via parse_obj + date: 2017-10-27 + description: | + In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation + fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated + "Ox should handle the error more gracefully" but has not confirmed a security implication. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 2.8.1" +--- diff --git a/advisories/_posts/2017-10-29-CVE-2017-16229.md b/advisories/_posts/2017-10-29-CVE-2017-16229.md new file mode 100644 index 00000000..68f21a81 --- /dev/null +++ b/advisories/_posts/2017-10-29-CVE-2017-16229.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2017-16229 (ox): ox ruby gem stack overflow in sax_parse' +comments: false +categories: +- ox +advisory: + gem: ox + cve: 2017-16229 + ghsa: wfwm-chj7-w59r + url: https://github.com/ohler55/ox/issues/195 + title: ox ruby gem stack overflow in sax_parse + date: 2017-10-29 + description: | + In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based + buffer over-read in the read_from_str function in sax_buf.c when a crafted input + is supplied to sax_parse. + cvss_v2: 4.3 + cvss_v3: 5.5 + patched_versions: + - ">= 2.8.2" +--- diff --git a/advisories/_posts/2017-11-03-CVE-2017-16516.md b/advisories/_posts/2017-11-03-CVE-2017-16516.md new file mode 100644 index 00000000..1dd97686 --- /dev/null +++ b/advisories/_posts/2017-11-03-CVE-2017-16516.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2017-16516 (yajl-ruby): Flaw in yajl-ruby gem may cause a DoS' +comments: false +categories: +- yajl-ruby +advisory: + gem: yajl-ruby + cve: 2017-16516 + ghsa: wwh7-4jw9-33x6 + url: https://nvd.nist.gov/vuln/detail/CVE-2017-16516 + title: Flaw in yajl-ruby gem may cause a DoS + date: 2017-11-03 + description: | + In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to + Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the + yajl_string_decode function in yajl_encode.c. This results in the whole ruby + process terminating and potentially a denial of service. + cvss_v3: 7.5 + patched_versions: + - ">= 1.3.1" + related: + url: + - https://github.com/brianmario/yajl-ruby/issues/176 +--- diff --git a/advisories/_posts/2017-11-07-CVE-2017-0904.md b/advisories/_posts/2017-11-07-CVE-2017-0904.md new file mode 100644 index 00000000..accb7d96 --- /dev/null +++ b/advisories/_posts/2017-11-07-CVE-2017-0904.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2017-0904 (private_address_check): private_address_check Ruby Gem Resolv.getaddresses + Server-Side Request Forgery' +comments: false +categories: +- private_address_check +advisory: + gem: private_address_check + cve: 2017-0904 + ghsa: hxhj-hp9m-qwc4 + url: https://github.com/jtdowney/private_address_check/issues/1 + title: private_address_check Ruby Gem Resolv.getaddresses Server-Side Request Forgery + date: 2017-11-07 + description: | + The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's + Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security + measures, such as when used to blacklist private network addresses to prevent server-side + request forgery. + cvss_v2: 6.8 + cvss_v3: 8.1 + patched_versions: + - ">= 0.4.0" +--- diff --git a/advisories/_posts/2017-11-09-CVE-2017-0905.md b/advisories/_posts/2017-11-09-CVE-2017-0905.md new file mode 100644 index 00000000..ccd5f5a2 --- /dev/null +++ b/advisories/_posts/2017-11-09-CVE-2017-0905.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2017-0905 (recurly): SSRF vulnerability in Recurly gem''s Resource#find.' +comments: false +categories: +- recurly +advisory: + gem: recurly + cve: 2017-0905 + ghsa: x27v-x225-gq8g + url: https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be + title: SSRF vulnerability in Recurly gem's Resource#find. + date: 2017-11-09 + description: | + If you are using the #find method on any of the classes that are derived from + the Resource class and you are passing user input into that method, a + malicious user can force the http client to reach out to a server under their + control. This can lead to leakage of your private API key. + + Because of the severity of impact, we are recommending that all users upgrade + to a patched version. We have provided a non-breaking patch for every 2.X + version of the client. + cvss_v3: 9.8 + patched_versions: + - "~> 2.0.13" + - "~> 2.1.11" + - "~> 2.2.5" + - "~> 2.3.10" + - "~> 2.4.11" + - "~> 2.5.3" + - "~> 2.6.3" + - "~> 2.7.8" + - "~> 2.8.2" + - "~> 2.9.2" + - "~> 2.10.4" + - "~> 2.11.3" + - ">= 2.12.0" +--- diff --git a/advisories/_posts/2017-11-09-CVE-2017-0909.md b/advisories/_posts/2017-11-09-CVE-2017-0909.md new file mode 100644 index 00000000..4d1a18df --- /dev/null +++ b/advisories/_posts/2017-11-09-CVE-2017-0909.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2017-0909 (private_address_check): private_address_check Ruby Gem Blacklist + Bypass privilege escalation' +comments: false +categories: +- private_address_check +advisory: + gem: private_address_check + cve: 2017-0909 + ghsa: 3v3c-r5v2-68ph + url: https://github.com/jtdowney/private_address_check/pull/3 + title: private_address_check Ruby Gem Blacklist Bypass privilege escalation + date: 2017-11-09 + description: | + The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incomplete + blacklist of common private/local network addresses used to prevent server-side request forgery. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 0.4.1" +--- diff --git a/advisories/_posts/2017-11-10-CVE-2017-16792.md b/advisories/_posts/2017-11-10-CVE-2017-16792.md new file mode 100644 index 00000000..f7bb8449 --- /dev/null +++ b/advisories/_posts/2017-11-10-CVE-2017-16792.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2017-16792 (geminabox): Stored XSS in "geminabox" via injection in Gemspec + "homepage" value' +comments: false +categories: +- geminabox +advisory: + gem: geminabox + cve: 2017-16792 + ghsa: 653m-r33x-39ff + url: https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md#01310-2017-11-13 + title: Stored XSS in "geminabox" via injection in Gemspec "homepage" value + date: 2017-11-10 + description: | + Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem + in a Box) allows attackers to inject arbitrary web script via a crafted + JavaScript URL in the "homepage" value of a ".gemspec" file. + + A ".gemspec" file must be created with a JavaScript URL in the homepage + value. This can be used to build a gem for upload to the Geminabox server, + in order to achieve stored XSS via the gem hyperlink. + cvss_v3: 6.1 + patched_versions: + - ">= 0.13.10" + related: + url: + - https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7 + - https://github.com/geminabox/geminabox/commit/e7e0b16147677e9029f0b55eff6bc6dda52398d4 +--- diff --git a/advisories/_posts/2017-11-15-CVE-2017-7475.md b/advisories/_posts/2017-11-15-CVE-2017-7475.md new file mode 100644 index 00000000..16ccd90e --- /dev/null +++ b/advisories/_posts/2017-11-15-CVE-2017-7475.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2017-7475 (cairo): cairo NULL pointer dereference' +comments: false +categories: +- cairo +advisory: + gem: cairo + cve: 2017-7475 + ghsa: 5v3f-73gv-x7x5 + url: https://bugs.freedesktop.org/show_bug.cgi?id=100763 + date: 2017-11-15 + title: cairo NULL pointer dereference + description: | + Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related + to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. + cvss_v3: 5.5 + patched_versions: + - ">= 1.15.5" +--- diff --git a/advisories/_posts/2017-11-16-CVE-2014-9489.md b/advisories/_posts/2017-11-16-CVE-2014-9489.md new file mode 100644 index 00000000..a0358288 --- /dev/null +++ b/advisories/_posts/2017-11-16-CVE-2014-9489.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2014-9489 (gollum): gollum and gollum-lib allow remote authenticated users + to execute arbitrary code' +comments: false +categories: +- gollum +advisory: + gem: gollum + cve: 2014-9489 + ghsa: q97v-764g-r2rp + url: https://github.com/gollum/gollum/issues/913 + title: gollum and gollum-lib allow remote authenticated users to execute arbitrary + code + date: 2017-11-16 + description: | + The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and + the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string `master` + is in any of the wiki documents, allows remote authenticated users to execute arbitrary + code via the `-O` or `--open-files-in-pager` flags. + cvss_v2: 6.5 + cvss_v3: 8.8 + patched_versions: + - ">= 3.1.1" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-9489 + - https://github.com/gollum/gollum/issues/913 + - https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7 + - http://www.openwall.com/lists/oss-security/2015/01/03/19 + - https://web.archive.org/web/20200229041306/http://www.securityfocus.com/bid/71499 + - https://github.com/advisories/GHSA-q97v-764g-r2rp +--- diff --git a/advisories/_posts/2017-11-16-CVE-2017-1000248.md b/advisories/_posts/2017-11-16-CVE-2017-1000248.md new file mode 100644 index 00000000..8c4e487a --- /dev/null +++ b/advisories/_posts/2017-11-16-CVE-2017-1000248.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2017-1000248 (redis-store): Unsafe objects can be loaded from Redis' +comments: false +categories: +- redis-store +advisory: + gem: redis-store + cve: 2017-1000248 + ghsa: 2w67-526p-gm73 + url: https://github.com/redis-store/redis-store/commit/ce13252c26fcc40ed4935c9abfeb0ee0761e5704 + title: Unsafe objects can be loaded from Redis + date: 2017-11-16 + description: | + Redis-store <=v1.3.0 allows unsafe objects to be loaded from Redis via the + use of the Marshal serializer. + cvss_v3: 9.8 + patched_versions: + - ">= 1.4.0" +--- diff --git a/advisories/_posts/2017-11-28-CVE-2017-17042.md b/advisories/_posts/2017-11-28-CVE-2017-17042.md new file mode 100644 index 00000000..e9481d4a --- /dev/null +++ b/advisories/_posts/2017-11-28-CVE-2017-17042.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2017-17042 (yard): Potential arbitrary file read vulnerability in yard + server' +comments: false +categories: +- yard +advisory: + gem: yard + cve: 2017-17042 + ghsa: gj4p-3wh3-2rmf + url: https://nvd.nist.gov/vuln/detail/CVE-2017-17042 + title: Potential arbitrary file read vulnerability in yard server + date: 2017-11-28 + description: | + lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block + relative paths with an initial ../ sequence, which allows attackers to conduct + directory traversal attacks and read arbitrary files. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 0.9.11" +--- diff --git a/advisories/_posts/2017-12-17-CVE-2017-17718.md b/advisories/_posts/2017-12-17-CVE-2017-17718.md new file mode 100644 index 00000000..6a9e0f01 --- /dev/null +++ b/advisories/_posts/2017-12-17-CVE-2017-17718.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2017-17718 (net-ldap): No validation of hostname certificate in net-ldap' +comments: false +categories: +- net-ldap +advisory: + gem: net-ldap + cve: 2017-17718 + ghsa: m7p8-9w66-9frm + url: https://github.com/ruby-ldap/ruby-net-ldap/issues/258 + title: No validation of hostname certificate in net-ldap + date: 2017-12-17 + description: | + The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL + Certificate Validation. The LDAP server's certificate was not verified + to match the host it was supposed to be connecting to. + cvss_v3: 5.9 + patched_versions: + - ">= 0.16.0" + related: + url: + - https://github.com/ruby-ldap/ruby-net-ldap/pull/279 + - https://github.com/ruby-ldap/ruby-net-ldap/commit/e4c46a223a19feda78393a793711353aa1febdcd +--- diff --git a/advisories/_posts/2018-01-04-CVE-2018-5216.md b/advisories/_posts/2018-01-04-CVE-2018-5216.md new file mode 100644 index 00000000..a4e24423 --- /dev/null +++ b/advisories/_posts/2018-01-04-CVE-2018-5216.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2018-5216 (radiant): Radiant CMS 1.1.4 Markdown admin/pages/*/edit part_body_content + cross site scripting' +comments: false +categories: +- radiant +advisory: + gem: radiant + cve: 2018-5216 + ghsa: mvw8-v767-qhjm + url: https://github.com/imsebao/404team/blob/master/radiantcms.md + title: Radiant CMS 1.1.4 Markdown admin/pages/*/edit part_body_content cross site + scripting + date: 2018-01-04 + description: | + Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content + parameter to an admin/pages/*/edit resource. + cvss_v2: 3.5 + cvss_v3: 5.4 +--- diff --git a/advisories/_posts/2018-01-09-CVE-2018-7212.md b/advisories/_posts/2018-01-09-CVE-2018-7212.md new file mode 100644 index 00000000..6e4227f1 --- /dev/null +++ b/advisories/_posts/2018-01-09-CVE-2018-7212.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2018-7212 (sinatra): sinatra ruby gem path traversal via backslash characters + on Windows' +comments: false +categories: +- sinatra +advisory: + gem: sinatra + cve: 2018-7212 + ghsa: h29f-7f56-j8wh + url: https://github.com/sinatra/sinatra/pull/1379 + title: sinatra ruby gem path traversal via backslash characters on Windows + date: 2018-01-09 + description: | + An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb + in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash + characters. + cvss_v2: 5.0 + cvss_v3: 5.3 + unaffected_versions: + - "< 2.0.0" + patched_versions: + - ">= 2.0.1" +--- diff --git a/advisories/_posts/2018-01-10-CVE-2017-12097.md b/advisories/_posts/2018-01-10-CVE-2017-12097.md new file mode 100644 index 00000000..ffba802f --- /dev/null +++ b/advisories/_posts/2018-01-10-CVE-2017-12097.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2017-12097 (delayed_job_web): delayed_job_web ruby gem XSS vulnerability + via `queues` parameter' +comments: false +categories: +- delayed_job_web +advisory: + gem: delayed_job_web + cve: 2017-12097 + ghsa: w7q9-xr2x-wh7x + url: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449 + title: delayed_job_web ruby gem XSS vulnerability via `queues` parameter + date: 2018-01-10 + description: | + An exploitable cross site scripting (XSS) vulnerability exists in the + filter functionality of the delayed_job_web ruby gem. A specially crafted + URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary + javascript on the victim's browser. An attacker can phish an authenticated user + to trigger this vulnerability. + cvss_v3: 6.1 + patched_versions: + - ">= 1.4.2" +--- diff --git a/advisories/_posts/2018-01-10-CVE-2017-12098.md b/advisories/_posts/2018-01-10-CVE-2017-12098.md new file mode 100644 index 00000000..f904a7c1 --- /dev/null +++ b/advisories/_posts/2018-01-10-CVE-2017-12098.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2017-12098 (rails_admin): rails_admin ruby gem XSS vulnerability' +comments: false +categories: +- rails_admin +advisory: + gem: rails_admin + cve: 2017-12098 + ghsa: pxr8-w3jq-rcwj + url: https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450 + title: rails_admin ruby gem XSS vulnerability + date: 2018-01-10 + description: | + An exploitable cross site scripting (XSS) vulnerability exists in the + add filter functionality of the rails_admin rails gem version 1.2.0. A specially + crafted URL can cause an XSS flaw resulting in an attacker being able to execute + arbitrary javascript on the victim's browser. An attacker can phish an authenticated + user to trigger this vulnerability. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 1.3.0" + related: + url: + - https://github.com/sferik/rails_admin/issues/2985 +--- diff --git a/advisories/_posts/2018-01-18-CVE-2016-10707.md b/advisories/_posts/2018-01-18-CVE-2016-10707.md new file mode 100644 index 00000000..6191c005 --- /dev/null +++ b/advisories/_posts/2018-01-18-CVE-2016-10707.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2016-10707 (jquery-rails): Denial of Service in jquery' +comments: false +categories: +- jquery-rails +advisory: + gem: jquery-rails + cve: 2016-10707 + ghsa: mhpp-875w-9cpv + url: https://nvd.nist.gov/vuln/detail/CVE-2016-10707 + title: Denial of Service in jquery + date: 2018-01-18 + description: | + Affected versions of `jquery` use a lowercasing logic on attribute + names. When given a boolean attribute with a name that contains + uppercase characters, `jquery` enters into an infinite recursion + loop, exceeding the call stack limit, and resulting in a denial + of service condition. + + ## Recommendation + + Update to version 3.0.0 or later. + cvss_v2: 5.0 + cvss_v3: 7.5 + unaffected_versions: + - "< 3.0.0-rc.1" + patched_versions: + - ">= 3.0.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2016-10707 + - https://github.com/advisories/GHSA-mhpp-875w-9cpv + - https://github.com/jquery/jquery/issues/3133 + - https://github.com/jquery/jquery/issues/3133#issuecomment-358978489 + - https://www.npmjs.com/advisories/330 + - https://github.com/jquery/jquery/pull/3134 + - https://snyk.io/vuln/npm:jquery:20160529 +--- diff --git a/advisories/_posts/2018-01-22-CVE-2015-9251.md b/advisories/_posts/2018-01-22-CVE-2015-9251.md new file mode 100644 index 00000000..69c964f1 --- /dev/null +++ b/advisories/_posts/2018-01-22-CVE-2015-9251.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2015-9251 (jquery-rails): Cross-Site Scripting (XSS) in jquery' +comments: false +categories: +- jquery-rails +- rails +advisory: + gem: jquery-rails + framework: rails + cve: 2015-9251 + ghsa: rmxg-73gg-4p98 + url: https://github.com/rails/jquery-rails/releases/tag/v4.2.0 + title: Cross-Site Scripting (XSS) in jquery + date: 2018-01-22 + description: | + Affected versions of `jquery` interpret `text/javascript` responses + from cross-origin ajax requests, and automatically execute the + contents in `jQuery.globalEval`, even when the ajax request + doesn't contain the `dataType` option. + cvss_v2: 6.1 + cvss_v3: 6.1 + patched_versions: + - ">= 4.2.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2015-9251 + - https://github.com/rails/jquery-rails/releases/tag/v4.2.0 + - https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#420 + - https://github.com/rails/jquery-rails/blob/v4.2.0/vendor/assets/javascripts/jquery3.js#L9377 + - https://github.com/advisories/GHSA-rmxg-73gg-4p98 +--- diff --git a/advisories/_posts/2018-01-23-CVE-2017-0889.md b/advisories/_posts/2018-01-23-CVE-2017-0889.md new file mode 100644 index 00000000..c6bb39f9 --- /dev/null +++ b/advisories/_posts/2018-01-23-CVE-2017-0889.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2017-0889 (paperclip): Paperclip ruby gem suffers from a Server-Side Request + Forgery (SSRF) vulnerability in the Paperclip::UriAdapter and Paperclip::HttpUrlProxyAdapter + class.' +comments: false +categories: +- paperclip +advisory: + gem: paperclip + cve: 2017-0889 + ghsa: 5jcf-c5rg-rmm8 + url: https://github.com/thoughtbot/paperclip/pull/2435 + title: Paperclip ruby gem suffers from a Server-Side Request Forgery (SSRF) vulnerability + in the Paperclip::UriAdapter and Paperclip::HttpUrlProxyAdapter class. + date: 2018-01-23 + description: | + Paperclip gem provides multiple ways a file can be uploaded to a web server. + The vulnerability affects two of Paperclip’s IO adapters that accept URLs as + attachment data (UriAdapter and HttpUrlProxyAdapter). When these adapters are + used, Paperclip acts as a proxy and downloads the file from the website URI + that is passed in. The library does not perform any validation to protect + against Server Side Request Forgery (SSRF) exploits by default. This may allow + a remote attacker to access information about internal network resources. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 5.2.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2017-0889 + - https://github.com/thoughtbot/paperclip/commit/4ebedfbd11d20d03ed03a1274ed281eee62715d4 +--- diff --git a/advisories/_posts/2018-01-29-CVE-2017-15412.md b/advisories/_posts/2018-01-29-CVE-2017-15412.md new file mode 100644 index 00000000..89225cbe --- /dev/null +++ b/advisories/_posts/2018-01-29-CVE-2017-15412.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2017-15412 (nokogiri): Nokogiri gem, via libxml, is affected by DoS vulnerabilities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2017-15412 + ghsa: r58r-74gx-6wx3 + url: https://github.com/sparklemotion/nokogiri/issues/1714 + title: Nokogiri gem, via libxml, is affected by DoS vulnerabilities + date: 2018-01-29 + description: | + The version of libxml2 packaged with Nokogiri contains a + vulnerability. Nokogiri has mitigated these issue by upgrading to + libxml 2.9.6. + + It was discovered that libxml2 incorrecty handled certain files. An attacker + could use this issue with specially constructed XML data to cause libxml2 to + consume resources, leading to a denial of service. + cvss_v3: 8.8 + patched_versions: + - ">= 1.8.2" + related: + cve: + - 2017-18258 + url: + - https://usn.ubuntu.com/usn/usn-3513-1/ + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html +--- diff --git a/advisories/_posts/2018-01-29-CVE-2017-16932.md b/advisories/_posts/2018-01-29-CVE-2017-16932.md new file mode 100644 index 00000000..dc965339 --- /dev/null +++ b/advisories/_posts/2018-01-29-CVE-2017-16932.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2017-16932 (nokogiri): Nokogiri gem, via libxml, is affected by DoS vulnerabilities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2017-16932 + ghsa: x2fm-93ww-ggvx + url: https://github.com/sparklemotion/nokogiri/issues/1714 + title: Nokogiri gem, via libxml, is affected by DoS vulnerabilities + date: 2018-01-29 + description: | + The version of libxml2 packaged with Nokogiri contains a + vulnerability. Nokogiri has mitigated these issue by upgrading to + libxml 2.9.5. + + Wei Lei discovered that libxml2 incorrecty handled certain parameter + entities. An attacker could use this issue with specially constructed XML + data to cause libxml2 to consume resources, leading to a denial of service. + cvss_v3: 7.5 + patched_versions: + - ">= 1.8.1" + related: + url: + - https://usn.ubuntu.com/usn/usn-3504-1/ + - https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html +--- diff --git a/advisories/_posts/2018-02-18-CVE-2018-7212.md b/advisories/_posts/2018-02-18-CVE-2018-7212.md new file mode 100644 index 00000000..2eb44330 --- /dev/null +++ b/advisories/_posts/2018-02-18-CVE-2018-7212.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2018-7212 (rack-protection): Path traversal is possible via backslash + characters on Windows.' +comments: false +categories: +- rack-protection +advisory: + gem: rack-protection + cve: 2018-7212 + url: https://github.com/sinatra/sinatra/pull/1379 + title: Path traversal is possible via backslash characters on Windows. + date: 2018-02-18 + description: | + An issue was discovered in rack-protection 2.x before 2.0.1 on Windows. Path traversal + is possible via backslash characters. + patched_versions: + - ">= 2.0.1" + - "~> 1.5.4" +--- diff --git a/advisories/_posts/2018-02-19-CVE-2018-7261.md b/advisories/_posts/2018-02-19-CVE-2018-7261.md new file mode 100644 index 00000000..5e4297af --- /dev/null +++ b/advisories/_posts/2018-02-19-CVE-2018-7261.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2018-7261 (radiant): Multiple persistent XSS vulnerabilities in Radiant + CMS' +comments: false +categories: +- radiant +advisory: + gem: radiant + cve: 2018-7261 + ghsa: gp82-xr77-88f4 + url: https://github.com/radiant/radiant/issues/412 + title: Multiple persistent XSS vulnerabilities in Radiant CMS + date: 2018-02-19 + description: | + There are multiple Persistent XSS vulnerabilities in Radiant CMS. + They affect Personal Preferences (Name and Username) and Configuration (Site Title, + Dev Site Domain, Page Parts, and Page Fields). + cvss_v2: 3.5 + cvss_v3: 5.4 +--- diff --git a/advisories/_posts/2018-02-21-CVE-2018-1000088.md b/advisories/_posts/2018-02-21-CVE-2018-1000088.md new file mode 100644 index 00000000..2e832cfa --- /dev/null +++ b/advisories/_posts/2018-02-21-CVE-2018-1000088.md @@ -0,0 +1,42 @@ +--- +layout: advisory +title: 'CVE-2018-1000088 (doorkeeper): Doorkeeper gem has stored XSS on authorization + consent view' +comments: false +categories: +- doorkeeper +advisory: + gem: doorkeeper + cve: 2018-1000088 + ghsa: hwhh-2fwm-cfgw + url: https://blog.justinbull.ca/cve-2018-1000088-stored-xss-in-doorkeeper/ + title: Doorkeeper gem has stored XSS on authorization consent view + date: 2018-02-21 + description: | + Stored XSS on the OAuth Client's name will cause users being prompted for + consent via the "implicit" grant type to execute the XSS payload. + + The XSS attack could gain access to the user's active session, resulting in + account compromise. + + Any user is susceptible if they click the authorization link for the + malicious OAuth client. Because of how the links work, a user cannot tell if + a link is malicious or not without first visiting the page with the XSS + payload. + + If 3rd parties are allowed to create OAuth clients in the app using + Doorkeeper, upgrade to the patched versions immediately. + + Additionally there is stored XSS in the native_redirect_uri form element. + + DWF has assigned CVE-2018-1000088. + cvss_v3: 7.6 + unaffected_versions: + - "< 2.1.0" + patched_versions: + - ">= 4.2.6" + related: + url: + - https://github.com/doorkeeper-gem/doorkeeper/issues/969 + - https://github.com/doorkeeper-gem/doorkeeper/issues/970 +--- diff --git a/advisories/_posts/2018-02-27-CVE-2017-11428.md b/advisories/_posts/2018-02-27-CVE-2017-11428.md new file mode 100644 index 00000000..37935acb --- /dev/null +++ b/advisories/_posts/2018-02-27-CVE-2017-11428.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2017-11428 (ruby-saml): Authentication bypass via incorrect XML canonicalization + and DOM traversal' +comments: false +categories: +- ruby-saml +advisory: + gem: ruby-saml + cve: 2017-11428 + ghsa: x2fr-v8wf-8wwv + url: https://github.com/onelogin/ruby-saml/commit/048a544730930f86e46804387a6b6fad50d8176f + title: Authentication bypass via incorrect XML canonicalization and DOM traversal + date: 2018-02-27 + description: | + ruby-saml prior to version 1.7.0 is vulnerable to an authentication bypass via incorrect + XML canonicalization and DOM traversal. Specifically, there are inconsistencies in + handling of comments within XML nodes, resulting in incorrect parsing of the inner text + of XML nodes such that any inner text after the comment is lost prior to + cryptographically signing the SAML message. Text after the comment therefore has no + impact on the signature on the SAML message. + + A remote attacker can modify SAML content for a SAML service provider without + invalidating the cryptographic signature, which may allow attackers to bypass + primary authentication for the affected SAML service provider. + cvss_v2: 6.3 + cvss_v3: 7.7 + patched_versions: + - ">= 1.7.0" + related: + url: + - https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations + - https://www.kb.cert.org/vuls/id/475445 +--- diff --git a/advisories/_posts/2018-02-27-CVE-2017-11430.md b/advisories/_posts/2018-02-27-CVE-2017-11430.md new file mode 100644 index 00000000..1eb53609 --- /dev/null +++ b/advisories/_posts/2018-02-27-CVE-2017-11430.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2017-11430 (omniauth-saml): omniauth-saml authentication bypass via incorrect + XML canonicalization and DOM traversal' +comments: false +categories: +- omniauth-saml +advisory: + gem: omniauth-saml + cve: 2017-11430 + ghsa: 94hm-8q65-rmxm + url: https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations + title: omniauth-saml authentication bypass via incorrect XML canonicalization and + DOM traversal + date: 2018-02-27 + description: | + OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the + results of XML DOM traversal and canonicalization APIs in such a way that an attacker + may be able to manipulate the SAML data without invalidating the cryptographic signature, + allowing the attack to potentially bypass authentication to SAML service providers. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 1.10.0" +--- diff --git a/advisories/_posts/2018-03-07-CVE-2018-1000119.md b/advisories/_posts/2018-03-07-CVE-2018-1000119.md new file mode 100644 index 00000000..c19c8d59 --- /dev/null +++ b/advisories/_posts/2018-03-07-CVE-2018-1000119.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2018-1000119 (rack-protection): rack-protection gem timing attack vulnerability + when validating CSRF token' +comments: false +categories: +- rack-protection +advisory: + gem: rack-protection + cve: 2018-1000119 + ghsa: 688c-3x49-6rqj + url: https://github.com/sinatra/rack-protection/pull/98 + title: rack-protection gem timing attack vulnerability when validating CSRF token + date: 2018-03-07 + description: | + Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains + a timing attack vulnerability in the CSRF token checking that can result in signatures + can be exposed. This attack appear to be exploitable via network connectivity to + the ruby application. + cvss_v2: 4.3 + cvss_v3: 5.9 + patched_versions: + - "~> 1.5.5" + - ">= 2.0.0" +--- diff --git a/advisories/_posts/2018-03-16-CVE-2018-8048.md b/advisories/_posts/2018-03-16-CVE-2018-8048.md new file mode 100644 index 00000000..f6ddebcc --- /dev/null +++ b/advisories/_posts/2018-03-16-CVE-2018-8048.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2018-8048 (loofah): Loofah XSS Vulnerability' +comments: false +categories: +- loofah +advisory: + gem: loofah + cve: 2018-8048 + ghsa: x7rv-cr6v-4vm4 + url: https://github.com/flavorjones/loofah/issues/144 + title: Loofah XSS Vulnerability + date: 2018-03-16 + description: | + Loofah allows non-whitelisted attributes to be present in sanitized + output when input with specially-crafted HTML fragments. + cvss_v3: 6.1 + patched_versions: + - ">= 2.2.1" +--- diff --git a/advisories/_posts/2018-03-19-CVE-2018-3740.md b/advisories/_posts/2018-03-19-CVE-2018-3740.md new file mode 100644 index 00000000..07591c69 --- /dev/null +++ b/advisories/_posts/2018-03-19-CVE-2018-3740.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2018-3740 (sanitize): HTML injection/XSS in Sanitize' +comments: false +categories: +- sanitize +advisory: + gem: sanitize + cve: 2018-3740 + ghsa: 7f42-p84j-f58p + url: https://github.com/rgrove/sanitize/issues/176 + title: HTML injection/XSS in Sanitize + date: 2018-03-19 + description: | + When Sanitize gem is used in combination with libxml2 >= 2.9.2, + a specially crafted HTML fragment can cause libxml2 to generate + improperly escaped output, allowing non-whitelisted attributes to be + used on whitelisted elements. + + This can allow HTML and JavaScript injection, which could result in XSS + if Sanitize's output is served to browsers. + cvss_v3: 7.5 + unaffected_versions: + - "< 1.1.0" + patched_versions: + - "~> 2.1.1" + - ">= 4.6.3" + related: + url: + - https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e +--- diff --git a/advisories/_posts/2018-03-22-CVE-2018-3741.md b/advisories/_posts/2018-03-22-CVE-2018-3741.md new file mode 100644 index 00000000..bd36967a --- /dev/null +++ b/advisories/_posts/2018-03-22-CVE-2018-3741.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2018-3741 (rails-html-sanitizer): XSS vulnerability in rails-html-sanitizer' +comments: false +categories: +- rails-html-sanitizer +advisory: + gem: rails-html-sanitizer + cve: 2018-3741 + ghsa: px3r-jm9g-c8w8 + url: https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ + title: XSS vulnerability in rails-html-sanitizer + date: 2018-03-22 + description: | + There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows + non-whitelisted attributes to be present in sanitized output when input with + specially-crafted HTML fragments, and these attributes can lead to an XSS attack + on target applications. + + This issue is similar to CVE-2018-8048 in Loofah. + cvss_v3: 6.1 + patched_versions: + - ">= 1.0.4" + related: + cve: + - 2018-8048 + url: + - https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae +--- diff --git a/advisories/_posts/2018-03-29-CVE-2018-8048.md b/advisories/_posts/2018-03-29-CVE-2018-8048.md new file mode 100644 index 00000000..4df63a99 --- /dev/null +++ b/advisories/_posts/2018-03-29-CVE-2018-8048.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2018-8048 (nokogiri): Revert libxml2 behavior in Nokogiri gem that could + cause XSS' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2018-8048 + ghsa: x7rv-cr6v-4vm4 + url: https://github.com/sparklemotion/nokogiri/pull/1746 + title: Revert libxml2 behavior in Nokogiri gem that could cause XSS + date: 2018-03-29 + description: | + [MRI] Behavior in libxml2 has been reverted which caused + CVE-2018-8048 (loofah gem), CVE-2018-3740 (sanitize gem), and + CVE-2018-3741 (rails-html-sanitizer gem). The commit in question is + here: + + https://github.com/GNOME/libxml2/commit/960f0e2 + + and more information is available about this commit and its impact + here: + + https://github.com/flavorjones/loofah/issues/144 + + This release simply reverts the libxml2 commit in question to protect + users of Nokogiri's vendored libraries from similar vulnerabilities. + + If you're offended by what happened here, I'd kindly ask that you + comment on the upstream bug report here: + + https://bugzilla.gnome.org/show_bug.cgi?id=769760 + cvss_v3: 6.1 + patched_versions: + - ">= 1.8.3" + related: + cve: + - 2018-3740 + - 2018-3741 + url: + - https://github.com/GNOME/libxml2/commit/960f0e2 + - https://bugzilla.gnome.org/show_bug.cgi?id=769760 +--- diff --git a/advisories/_posts/2018-04-13-CVE-2017-18258.md b/advisories/_posts/2018-04-13-CVE-2017-18258.md new file mode 100644 index 00000000..6d02e071 --- /dev/null +++ b/advisories/_posts/2018-04-13-CVE-2017-18258.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2017-18258 (nokogiri): Moderate severity vulnerability that affects nokogiri' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2017-18258 + ghsa: 882p-jqgm-f45g + url: https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb + title: Moderate severity vulnerability that affects nokogiri + date: 2018-04-13 + description: | + The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial + of service (memory consumption) via a crafted LZMA file, because the decoder functionality does + not restrict memory usage to what is required for a legitimate file. + + References: + - https://nvd.nist.gov/vuln/detail/CVE-2017-18258 + - https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb + - https://github.com/advisories/GHSA-882p-jqgm-f45g + - https://kc.mcafee.com/corporate/index?page=content&id=SB10284 + - https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html + - https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html + - https://security.netapp.com/advisory/ntap-20190719-0001/ + - https://usn.ubuntu.com/3739-1/ + cvss_v3: 6.5 + patched_versions: + - ">= 1.8.2" +--- diff --git a/advisories/_posts/2018-04-23-CVE-2019-3881.md b/advisories/_posts/2018-04-23-CVE-2019-3881.md new file mode 100644 index 00000000..0afee844 --- /dev/null +++ b/advisories/_posts/2018-04-23-CVE-2019-3881.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2019-3881 (bundler): Insecure path handling in Bundler' +comments: false +categories: +- bundler +advisory: + gem: bundler + cve: 2019-3881 + ghsa: g98m-96g9-wfjq + url: https://github.com/advisories/GHSA-g98m-96g9-wfjq + date: 2018-04-23 + title: Insecure path handling in Bundler + description: | + Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with + insecure permissions as a storage location for gems, if locations under the user's + home directory are not available. If Bundler is used in a scenario where the user + does not have a writable home directory, an attacker could place malicious code + in this directory that would be later loaded and executed. + cvss_v3: 7.0 + patched_versions: + - ">= 2.1.0" + unaffected_versions: + - "< 1.14.0" +--- diff --git a/advisories/_posts/2018-04-30-CVE-2018-1000539.md b/advisories/_posts/2018-04-30-CVE-2018-1000539.md new file mode 100644 index 00000000..2963786c --- /dev/null +++ b/advisories/_posts/2018-04-30-CVE-2018-1000539.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2018-1000539 (json-jwt): Auth tag forgery vulnerability with AES-GCM encrypted + JWT' +comments: false +categories: +- json-jwt +advisory: + gem: json-jwt + cve: 2018-1000539 + ghsa: mj4x-wcxf-hm8x + url: https://github.com/nov/json-jwt/pull/62 + title: Auth tag forgery vulnerability with AES-GCM encrypted JWT + date: 2018-04-30 + description: | + Ruby's OpenSSL bindings do not check the length of the supplied + authentication tag when decrypting an authenticated encryption mode + such as AES-GCM, leaving this up to the authors of a gem/app to + implement for properly validating the message. + + json-jwt was not checking for the authentication tag length, meaning + that with a one byte tag the JWT would be considered not tampered + with. This means that with an average of 128 (max 256) attempts an + attacker can forge a valid signature. + cvss_v3: 5.3 + unaffected_versions: + - "< 0.5.1" + patched_versions: + - ">= 1.9.4" +--- diff --git a/advisories/_posts/2018-05-03-CVE-2018-3759.md b/advisories/_posts/2018-05-03-CVE-2018-3759.md new file mode 100644 index 00000000..1ce10f1a --- /dev/null +++ b/advisories/_posts/2018-05-03-CVE-2018-3759.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2018-3759 (private_address_check): private_address_check Ruby Gem Time-of-check + Time-of-use race condition' +comments: false +categories: +- private_address_check +advisory: + gem: private_address_check + cve: 2018-3759 + ghsa: 2xvj-j3qh-x8c3 + url: https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147 + title: private_address_check Ruby Gem Time-of-check Time-of-use race condition + date: 2018-05-03 + description: | + private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) + race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 + can trigger this case where the initial resolution is a public address by the subsequent + resolution is a private address. + patched_versions: + - ">= 0.5.0" +--- diff --git a/advisories/_posts/2018-05-23-CVE-2018-3769.md b/advisories/_posts/2018-05-23-CVE-2018-3769.md new file mode 100644 index 00000000..5ee46117 --- /dev/null +++ b/advisories/_posts/2018-05-23-CVE-2018-3769.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2018-3769 (grape): ruby-grape Gem has XSS via "format" parameter' +comments: false +categories: +- grape +advisory: + gem: grape + cve: 2018-3769 + ghsa: f599-5m7p-hcpf + url: https://github.com/ruby-grape/grape/issues/1762 + title: ruby-grape Gem has XSS via "format" parameter + date: 2018-05-23 + description: | + When request on API contains the "format" parameter in GET, the input + value of this parameter is rendered as the web-server responds with + text/html header. + + Example: + http://example.com/api/endpoint?format=%3Cscript%3Ealert(document.cookie)%3C/script%3E + cvss_v3: 6.1 + patched_versions: + - ">= 1.1.0" + related: + url: + - https://github.com/ruby-grape/grape/pull/1763 + - https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af +--- diff --git a/advisories/_posts/2018-05-31-CVE-2018-11627.md b/advisories/_posts/2018-05-31-CVE-2018-11627.md new file mode 100644 index 00000000..fbddb16f --- /dev/null +++ b/advisories/_posts/2018-05-31-CVE-2018-11627.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2018-11627 (sinatra): XSS via the 400 Bad Request page' +comments: false +categories: +- sinatra +advisory: + gem: sinatra + cve: 2018-11627 + ghsa: mq35-wqvf-r23c + url: https://github.com/sinatra/sinatra/issues/1428 + title: XSS via the 400 Bad Request page + date: 2018-05-31 + description: | + Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs + upon a params parser exception. + cvss_v3: 6.1 + unaffected_versions: + - "< 2.0.0.beta1" + - "= 2.0.0-alpha" + patched_versions: + - ">= 2.0.2" +--- diff --git a/advisories/_posts/2018-06-12-CVE-2018-12026.md b/advisories/_posts/2018-06-12-CVE-2018-12026.md new file mode 100644 index 00000000..aa6a5027 --- /dev/null +++ b/advisories/_posts/2018-06-12-CVE-2018-12026.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2018-12026 (passenger): SpawningKit exploits' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2018-12026 + ghsa: 7cv3-gvmc-8mq5 + url: https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/ + title: SpawningKit exploits + date: 2018-06-12 + description: | + During the spawning of a malicious Passenger-managed application, SpawningKit + in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace + key files or directories in the spawning communication directory with + symlinks. This then could result in arbitrary reads and writes, which in turn + can result in information disclosure and privilege escalation. + cvss_v2: 7.5 + cvss_v3: 9.8 + unaffected_versions: + - "< 5.3.0" + patched_versions: + - ">= 5.3.2" + related: + cve: + - 2018-12027 + - 2018-12028 +--- diff --git a/advisories/_posts/2018-06-12-CVE-2018-12027.md b/advisories/_posts/2018-06-12-CVE-2018-12027.md new file mode 100644 index 00000000..5b444dfb --- /dev/null +++ b/advisories/_posts/2018-06-12-CVE-2018-12027.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2018-12027 (passenger): Insecure Permissions in Phusion Passenger' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2018-12027 + ghsa: whfx-877c-5p28 + url: https://blog.phusion.nl/passenger-5-3-2 + title: Insecure Permissions in Phusion Passenger + date: 2018-06-12 + description: | + "An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger + 5.3.x before 5.3.2 causes information disclosure in the following situation: given + a Passenger-spawned application process that reports that it listens on a certain + Unix domain socket, if any of the parent directories of said socket are writable + by a normal user that is not the application''s user, then that non-application + user can swap that directory with something else, resulting in traffic being redirected + to a non-application user''s process through an alternative Unix domain socket." + cvss_v2: 6.5 + cvss_v3: 8.8 + unaffected_versions: + - "< 5.3.0" + patched_versions: + - ">= 5.3.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-12027 + - https://blog.phusion.nl/passenger-5-3-2 + - https://security.gentoo.org/glsa/201807-02 + - https://github.com/advisories/GHSA-whfx-877c-5p28 +--- diff --git a/advisories/_posts/2018-06-12-CVE-2018-12028.md b/advisories/_posts/2018-06-12-CVE-2018-12028.md new file mode 100644 index 00000000..8279d0d9 --- /dev/null +++ b/advisories/_posts/2018-06-12-CVE-2018-12028.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2018-12028 (passenger): Incorrect Access Control in Phusion Passenger' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2018-12028 + ghsa: jjhj-8gx7-x836 + url: https://blog.phusion.nl/passenger-5-3-2 + title: Incorrect Access Control in Phusion Passenger + date: 2018-06-12 + description: | + An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger + 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning + a child process, to report an arbitrary different PID back to Passenger's process + manager. If the malicious application then generates an error, it would cause Passenger's + process manager to kill said reported arbitrary PID. + cvss_v2: 6.8 + cvss_v3: 7.8 + unaffected_versions: + - "< 5.3.0" + patched_versions: + - ">= 5.3.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-12028 + - https://blog.phusion.nl/passenger-5-3-2 + - https://security.gentoo.org/glsa/201807-02 + - https://github.com/advisories/GHSA-jjhj-8gx7-x836 +--- diff --git a/advisories/_posts/2018-06-12-CVE-2018-12029.md b/advisories/_posts/2018-06-12-CVE-2018-12029.md new file mode 100644 index 00000000..7d9a3223 --- /dev/null +++ b/advisories/_posts/2018-06-12-CVE-2018-12029.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2018-12029 (passenger): CHMOD race vulnerability' +comments: false +categories: +- passenger +advisory: + gem: passenger + cve: 2018-12029 + ghsa: jjcj-fgfm-9g9r + url: https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/ + title: CHMOD race vulnerability + date: 2018-06-12 + description: | + The file system access race condition allows for local privilege escalation + and affects the Nginx module for Passenger versions 5.3.1, all the way back + to 3.0.0 (the chown command entered the code in 2010). + + The vulnerability was exploitable only when running a non-standard + `passenger_instance_registry_dir`, via a race condition where after a file + was created, there was a window in which it could be replaced with a symlink + before it was chowned via the path and not the file descriptor. + + If the symlink target was to a file which would be executed by root such as + root's crontab file, then privilege escalation was possible. + cvss_v2: 4.4 + cvss_v3: 7.0 + unaffected_versions: + - "< 3.0.0" + patched_versions: + - ">= 5.3.2" +--- diff --git a/advisories/_posts/2018-06-14-CVE-2018-1000544.md b/advisories/_posts/2018-06-14-CVE-2018-1000544.md new file mode 100644 index 00000000..1a71543a --- /dev/null +++ b/advisories/_posts/2018-06-14-CVE-2018-1000544.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2018-1000544 (rubyzip): Directory Traversal in rubyzip' +comments: false +categories: +- rubyzip +advisory: + gem: rubyzip + cve: 2018-1000544 + ghsa: vqcq-mrmw-mcmg + url: https://github.com/rubyzip/rubyzip/issues/369 + title: Directory Traversal in rubyzip + date: 2018-06-14 + description: | + rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability + in Zip::File component that can result in write arbitrary files to the filesystem. + If a site allows uploading of .zip files, an attacker can upload a malicious file + which contains symlinks or files with absolute pathnames "../" to write arbitrary + files to the filesystem. + cvss_v3: 9.8 + patched_versions: + - ">= 1.2.2" + related: + cve: + - 2017-5946 + url: + - https://security-tracker.debian.org/tracker/CVE-2018-1000544 +--- diff --git a/advisories/_posts/2018-06-19-CVE-2018-3760.md b/advisories/_posts/2018-06-19-CVE-2018-3760.md new file mode 100644 index 00000000..107ddb51 --- /dev/null +++ b/advisories/_posts/2018-06-19-CVE-2018-3760.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2018-3760 (sprockets): Path Traversal in Sprockets' +comments: false +categories: +- sprockets +advisory: + gem: sprockets + cve: 2018-3760 + ghsa: pr3h-jjhj-573x + url: https://groups.google.com/forum/#!topic/ruby-security-ann/2S9Pwz2i16k + title: Path Traversal in Sprockets + date: 2018-06-19 + description: | + Specially crafted requests can be used to access files that exist on + the filesystem that is outside an application's root directory, when the + Sprockets server is used in production. + + All users running an affected release should either upgrade or use one of the work arounds immediately. + + Workaround: + In Rails applications, work around this issue, set `config.assets.compile = false` and + `config.public_file_server.enabled = true` in an initializer and precompile the assets. + + This work around will not be possible in all hosting environments and upgrading is advised. + cvss_v3: 7.5 + patched_versions: + - ">= 2.12.5, < 3.0.0" + - ">= 3.7.2, < 4.0.0" + - ">= 4.0.0.beta8" +--- diff --git a/advisories/_posts/2018-06-22-CVE-2018-1000201.md b/advisories/_posts/2018-06-22-CVE-2018-1000201.md new file mode 100644 index 00000000..49073c63 --- /dev/null +++ b/advisories/_posts/2018-06-22-CVE-2018-1000201.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2018-1000201 (ffi): ruby-ffi DDL loading issue on Windows OS' +comments: false +categories: +- ffi +advisory: + gem: ffi + cve: 2018-1000201 + ghsa: 2gw2-8q9w-cw8p + url: https://github.com/ffi/ffi/releases/tag/1.9.24 + title: ruby-ffi DDL loading issue on Windows OS + date: 2018-06-22 + description: | + ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be + hijacked on Windows OS, when a Symbol is used as DLL name instead of a String + This vulnerability appears to have been fixed in v1.9.24 and later. + cvss_v2: 6.8 + cvss_v3: 7.8 + patched_versions: + - ">= 1.9.24" + related: + url: + - https://github.com/ffi/ffi/commit/09e0c6076466b4383da7fa4e13f714311109945a + - https://github.com/ffi/ffi/commit/e0fe486df0e117ed67b0282b6ada04b7214ca05c +--- diff --git a/advisories/_posts/2018-07-03-CVE-2018-14040.md b/advisories/_posts/2018-07-03-CVE-2018-14040.md new file mode 100644 index 00000000..8b21fe0a --- /dev/null +++ b/advisories/_posts/2018-07-03-CVE-2018-14040.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2018-14040 (bootstrap): XSS vulnerabilities via data-parent, data-target, + data-container in bootstrap' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2018-14040 + ghsa: 3wqf-4x89-9g79 + url: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/ + title: XSS vulnerabilities via data-parent, data-target, data-container in bootstrap + date: 2018-07-03 + description: | + In Bootstrap before 4.1.2, XSS is possible in collapse data-parent + attribute (CVE-2018-14040), data-target property of scrollspy + (CVE-2018-14041), data-container property of tooltip (CVE-2018-14042) + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 4.1.2" + related: + cve: + - 2018-14041 + - 2018-14042 + url: + - https://nvd.nist.gov/vuln/detail/cve-2018-14040 + - https://github.com/twbs/bootstrap/issues/26423 + - https://github.com/twbs/bootstrap/pull/26630 + - https://github.com/advisories/GHSA-3wqf-4x89-9g79 +--- diff --git a/advisories/_posts/2018-07-11-CVE-2018-1000211.md b/advisories/_posts/2018-07-11-CVE-2018-1000211.md new file mode 100644 index 00000000..a8303dcd --- /dev/null +++ b/advisories/_posts/2018-07-11-CVE-2018-1000211.md @@ -0,0 +1,44 @@ +--- +layout: advisory +title: 'CVE-2018-1000211 (doorkeeper): Doorkeeper gem does not revoke token for public + clients' +comments: false +categories: +- doorkeeper +advisory: + gem: doorkeeper + cve: 2018-1000211 + ghsa: 694m-jhr9-pf77 + url: https://blog.justinbull.ca/cve-2018-1000211-public-apps-cant-revoke-tokens-in-doorkeeper/ + title: Doorkeeper gem does not revoke token for public clients + date: 2018-07-11 + description: | + Any OAuth application that uses public/non-confidential authentication when + interacting with Doorkeeper is unable to revoke its tokens when calling the + revocation endpoint. + + A bug in the token revocation API would cause it to attempt to authenticate + the public OAuth client as if it was a confidential app. Because of this, the + token is never revoked. + + The impact of this is the access or refresh token is not revoked, leaking + access to protected resources for the remainder of that token's lifetime. + + If Doorkeeper is used to facilitate public OAuth apps and leverage token + revocation functionality, upgrade to the patched versions immediately. + + Credit to Roberto Ostinelli for discovery, Justin Bull for the fixes. + + DWF has assigned CVE-2018-1000211. + cvss_v3: 7.5 + unaffected_versions: + - "< 4.2.0" + patched_versions: + - ">= 4.4.0" + - ">= 5.0.0.rc2" + related: + url: + - https://github.com/doorkeeper-gem/doorkeeper/issues/891 + - https://github.com/doorkeeper-gem/doorkeeper/pull/1119 + - https://github.com/doorkeeper-gem/doorkeeper/pull/1120 +--- diff --git a/advisories/_posts/2018-07-27-CVE-2018-3777.md b/advisories/_posts/2018-07-27-CVE-2018-3777.md new file mode 100644 index 00000000..faa9e084 --- /dev/null +++ b/advisories/_posts/2018-07-27-CVE-2018-3777.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2018-3777 (restforce): Insufficient URI encoding in restforce' +comments: false +categories: +- restforce +advisory: + gem: restforce + cve: 2018-3777 + ghsa: 534w-937m-v7x3 + url: https://github.com/restforce/restforce/pull/392 + title: Insufficient URI encoding in restforce + date: 2018-07-27 + description: | + A flaw in how restforce constructs URL's may allow an attacker to inject + additional parameters into Salesforce API requests. + + Impact + ------ + This flaw is only exploitable in applications that pass user input directly + to restforce's select, find, describe, update, upsert, and destroy methods. + Vulnerable code might look like: + + ```ruby + client.select('SomeSalesForceObject', params[:some-id], + ...) + ``` + + In such an application, attackers could pass `0016000000MRatd/describe` + as a request parameter, causing the server to make a request to a different + endpoint than the server is designed to handle. Since the Salesforce REST + API supports overriding HTTP methods via a request parameter, an attacker + could also cause the client's `select()` method to modify data, by passing + `0016000000MRatd/?_HttpMethod=PATCH&other-query-params=...`. + + Workarounds + ------ + If possible, applications should track salesforce IDs internally, rather than + passing user-supplied IDs to salesforce. Such practice mitigates this + vulnerability, and in general is desirable for ensuring strong access control. + cvss_v3: 9.8 + patched_versions: + - "~> 2.5.4" + - ">= 3.0.0" +--- diff --git a/advisories/_posts/2018-08-09-CVE-2018-3779.md b/advisories/_posts/2018-08-09-CVE-2018-3779.md new file mode 100644 index 00000000..b71dbc05 --- /dev/null +++ b/advisories/_posts/2018-08-09-CVE-2018-3779.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2018-3779 (active-support): Malicious ruby gem - active-support' +comments: false +categories: +- active-support +advisory: + gem: active-support + cve: 2018-3779 + ghsa: 2j55-pcw5-x4h2 + url: https://hackerone.com/reports/392311 + title: Malicious ruby gem - active-support + date: 2018-08-09 + description: | + The gem duplicates official `activesupport` (no hyphen) code, but adds a + compiled extension. The extension attempts to resolve a base64 encoded + domain, downloads a payload, and executes. + + Replace this gem with the official `activesupport` gem. + related: + url: + - https://github.com/rubygems/rubygems.org/pull/1762 +--- diff --git a/advisories/_posts/2018-09-13-CVE-2018-14041.md b/advisories/_posts/2018-09-13-CVE-2018-14041.md new file mode 100644 index 00000000..f01f5bbd --- /dev/null +++ b/advisories/_posts/2018-09-13-CVE-2018-14041.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2018-14041 (bootstrap): Bootstrap vulnerable to Cross-Site Scripting (XSS)' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2018-14041 + ghsa: 3wqf-4x89-9g79 + url: https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2 + title: Bootstrap vulnerable to Cross-Site Scripting (XSS) + date: 2018-09-13 + description: | + In Bootstrap before 4.1.2, XSS is possible in the collapse + data-parent attribute. + cvss_v3: 6.1 + patched_versions: + - ">= 4.1.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-14040 + - https://github.com/twbs/bootstrap/issues/26625 + - https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2 + - https://github.com/twbs/bootstrap/issues/26423 + - https://github.com/twbs/bootstrap/issues/26628 + - https://github.com/twbs/bootstrap/pull/26630 + - https://github.com/twbs/bootstrap/commit/149096016f70fd815540d62c0989fd99cdc809e0 + - https://github.com/twbs/bootstrap/blob/v3.4.1/js/collapse.js#L140 + - https://lists.debian.org/debian-lts-announce/2018/08/msg00027.html + - https://seclists.org/bugtraq/2019/May/18 + - https://www.oracle.com/security-alerts/cpuApr2021.html + - https://www.tenable.com/security/tns-2021-14 + - https://github.com/advisories/GHSA-3wqf-4x89-9g79 +--- diff --git a/advisories/_posts/2018-09-13-CVE-2018-14042.md b/advisories/_posts/2018-09-13-CVE-2018-14042.md new file mode 100644 index 00000000..63035f16 --- /dev/null +++ b/advisories/_posts/2018-09-13-CVE-2018-14042.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2018-14042 (bootstrap): Bootstrap Cross-site Scripting vulnerability' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2018-14042 + ghsa: 7mvr-5x2g-wfc8 + url: https://github.com/twbs/bootstrap/issues/26423 + title: Bootstrap Cross-site Scripting vulnerability + date: 2018-09-13 + description: | + In Bootstrap before 4.1.2, XSS is possible in the data-container property + of tooltip. This is similar to CVE-2018-14041. + cvss_v3: 6.1 + patched_versions: + - ">= 4.1.2" + related: + cve: + - 2018-14041 + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-14042 + - https://github.com/twbs/bootstrap/issues/26423 + - https://github.com/twbs/bootstrap/issues/26628 + - https://github.com/twbs/bootstrap/pull/26630 + - https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/ + - https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@ + - https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@ + - https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@ + - https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@ + - https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@ + - https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@ + - https://seclists.org/bugtraq/2019/May/18 + - https://www.oracle.com/security-alerts/cpuApr2021.html + - http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html + - http://seclists.org/fulldisclosure/2019/May/10 + - http://seclists.org/fulldisclosure/2019/May/11 + - http://seclists.org/fulldisclosure/2019/May/13 + - https://github.com/advisories/GHSA-7mvr-5x2g-wfc8 + - https://github.com/twbs/bootstrap/issues/26428 + - https://github.com/twbs/bootstrap/commit/2d90d369bbc2bd2647620246c55cec8c4705e3d0 + - https://www.tenable.com/security/tns-2021-14 +--- diff --git a/advisories/_posts/2018-09-14-CVE-2018-14643.md b/advisories/_posts/2018-09-14-CVE-2018-14643.md new file mode 100644 index 00000000..7c4da9b8 --- /dev/null +++ b/advisories/_posts/2018-09-14-CVE-2018-14643.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2018-14643 (smart_proxy_dynflow): smart_proxy_dynflow gem authentication + bypass in Foreman remote execution feature' +comments: false +categories: +- smart_proxy_dynflow +advisory: + gem: smart_proxy_dynflow + cve: 2018-14643 + ghsa: gx5g-xcxj-cx2w + url: https://github.com/theforeman/smart_proxy_dynflow/pull/54 + title: smart_proxy_dynflow gem authentication bypass in Foreman remote execution + feature + date: 2018-09-14 + description: | + An authentication bypass flaw was found in the smart_proxy_dynflow component + used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary + commands on machines managed by vulnerable Foreman instances, in a highly privileged + context. + cvss_v2: 10.0 + cvss_v3: 9.8 + patched_versions: + - "~> 0.1.11" + - ">= 0.2.1" +--- diff --git a/advisories/_posts/2018-09-28-CVE-2018-17567.md b/advisories/_posts/2018-09-28-CVE-2018-17567.md new file mode 100644 index 00000000..fdb79f14 --- /dev/null +++ b/advisories/_posts/2018-09-28-CVE-2018-17567.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2018-17567 (jekyll): Jekyll _config.yml privilege escalation' +comments: false +categories: +- jekyll +advisory: + gem: jekyll + cve: 2018-17567 + ghsa: 4xjh-m3qx-49wc + url: https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/ + title: Jekyll _config.yml privilege escalation + date: 2018-09-28 + description: | + Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows + attackers to access arbitrary files by specifying a symlink in the "include" key + in the "_config.yml" file. + cvss_v3: 7.5 + patched_versions: + - "~> 3.6.3" + - "~> 3.7.4" + - ">= 3.8.4" +--- diff --git a/advisories/_posts/2018-10-04-CVE-2018-14404.md b/advisories/_posts/2018-10-04-CVE-2018-14404.md new file mode 100644 index 00000000..4ff20be4 --- /dev/null +++ b/advisories/_posts/2018-10-04-CVE-2018-14404.md @@ -0,0 +1,78 @@ +--- +layout: advisory +title: 'CVE-2018-14404 (nokogiri): Nokogiri gem, via libxml2, is affected by multiple + vulnerabilities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2018-14404 + ghsa: 6qvp-r6r3-9p7h + url: https://github.com/sparklemotion/nokogiri/issues/1785 + title: Nokogiri gem, via libxml2, is affected by multiple vulnerabilities + date: 2018-10-04 + description: | + Nokogiri 1.8.5 has been released. + + This is a security and bugfix release. It addresses two CVEs in upstream + libxml2 rated as "medium" by Red Hat, for which details are below. + + If you're using your distro's system libraries, rather than Nokogiri's + vendored libraries, there's no security need to upgrade at this time, + though you may want to check with your distro whether they've patched this + (Canonical has patched Ubuntu packages). Note that these patches are not + yet (as of 2018-10-04) in an upstream release of libxml2. + + Full details about the security update are available in Github Issue #1785. + [#1785]: https://github.com/sparklemotion/nokogiri/issues/1785 + + ----- + + [MRI] Pulled in upstream patches from libxml2 that address CVE-2018-14404 + and CVE-2018-14567. Full details are available in #1785. Note that these + patches are not yet (as of 2018-10-04) in an upstream release of libxml2. + + ----- + + CVE-2018-14404 + + Permalink: + + https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14404.html + + Description: + + A NULL pointer dereference vulnerability exists in the + xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when + parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR + case. Applications processing untrusted XSL format inputs with the use of + the libxml2 library may be vulnerable to a denial of service attack due + to a crash of the application + + Canonical rates this vulnerability as "Priority: Medium" + + ----- + + CVE-2018-14567 + + Permalink: + + https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14567.html + + Description: + + infinite loop in LZMA decompression + + Canonical rates this vulnerability as "Priority: Medium" + cvss_v3: 7.5 + patched_versions: + - ">= 1.8.5" + related: + cve: + - 2018-14567 + url: + - https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ + - https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594 + - https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 +--- diff --git a/advisories/_posts/2018-10-17-CVE-2018-16395.md b/advisories/_posts/2018-10-17-CVE-2018-16395.md new file mode 100644 index 00000000..5b6d452e --- /dev/null +++ b/advisories/_posts/2018-10-17-CVE-2018-16395.md @@ -0,0 +1,50 @@ +--- +layout: advisory +title: 'CVE-2018-16395 (openssl): Incorrect value comparison in Ruby openssl' +comments: false +categories: +- openssl +advisory: + gem: openssl + cve: 2018-16395 + ghsa: mmrq-6999-72v8 + url: https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/ + title: Incorrect value comparison in Ruby openssl + date: 2018-10-17 + description: | + An issue was discovered in the OpenSSL library in Ruby when two OpenSSL::X509::Name + objects are compared using ==, depending on the ordering, non-equal objects may + return true. When the first argument is one character longer than the second, or + the second argument contains a character that is one less than a character in the + same position of the first argument, the result of == will be true. This could be + leveraged to create an illegitimate certificate that may be accepted as legitimate + and then used in signing or encryption operations. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 2.1.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-16395 + - https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/ + - https://hackerone.com/reports/387250 + - https://access.redhat.com/errata/RHSA-2018:3729 + - https://access.redhat.com/errata/RHSA-2018:3730 + - https://access.redhat.com/errata/RHSA-2018:3731 + - https://access.redhat.com/errata/RHSA-2018:3738 + - https://access.redhat.com/errata/RHSA-2019:1948 + - https://access.redhat.com/errata/RHSA-2019:2565 + - https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html + - https://security.netapp.com/advisory/ntap-20190221-0002/ + - https://usn.ubuntu.com/3808-1/ + - https://www.debian.org/security/2018/dsa-4332 + - https://www.oracle.com/security-alerts/cpujan2020.html + - https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/ + - https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/ + - https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/ + - https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/ + - http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html + - http://www.securitytracker.com/id/1042105 + - https://github.com/ruby/openssl/commit/f653cfa43f0f20e8c440122ea982382b6228e7f5 + - https://github.com/advisories/GHSA-mmrq-6999-72v8 +--- diff --git a/advisories/_posts/2018-10-19-CVE-2018-18476.md b/advisories/_posts/2018-10-19-CVE-2018-18476.md new file mode 100644 index 00000000..2b5e4170 --- /dev/null +++ b/advisories/_posts/2018-10-19-CVE-2018-18476.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2018-18476 (mysql-binuuid-rails): mysql-binuuid-rails allows SQL Injection + by removing default string escaping' +comments: false +categories: +- mysql-binuuid-rails +advisory: + gem: mysql-binuuid-rails + cve: 2018-18476 + ghsa: 6j63-35hj-vmcg + url: https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6 + title: mysql-binuuid-rails allows SQL Injection by removing default string escaping + date: 2018-10-19 + description: | + mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes + default string escaping for affected database columns. ActiveRecord does not + explicitly escape the Binary data type (Type::Binary::Data) for mysql. + mysql-binuuid-rails uses a data type that is derived from the base Binary + type, except, it doesn’t convert the value to hex. Instead, it assumes the + string value provided is a valid hex string and doesn’t do any checks on it. + cvss_v3: 9.8 + patched_versions: + - ">= 1.1.1" + related: + url: + - https://github.com/nedap/mysql-binuuid-rails/pull/18 +--- diff --git a/advisories/_posts/2018-10-27-CVE-2018-1000842.md b/advisories/_posts/2018-10-27-CVE-2018-1000842.md new file mode 100644 index 00000000..22b30788 --- /dev/null +++ b/advisories/_posts/2018-10-27-CVE-2018-1000842.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2018-1000842 (fat_free_crm): fat_free_crm gem XSS vulnerability via query + parameter' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2018-1000842 + ghsa: j5rj-g695-342r + url: https://github.com/fatfreecrm/fat_free_crm/wiki/XSS-Vulnerability-%282018-10-27%29 + title: fat_free_crm gem XSS vulnerability via query parameter + date: 2018-10-27 + description: | + FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 + <=0.17.2, ==0.18.0 contains a Cross Site Scripting (XSS) vulnerability in commit + 6d60bc8ed010c4eda05d6645c64849f415f68d65 that can result in Javascript execution. + This attack appear to be exploitable via Content with Javascript payload will be + executed on end user browsers when they visit the page. This vulnerability appears + to have been fixed in 0.18.1, 0.17.3, 0.16.4, 0.15.2, 0.14.2. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 0.18.1" + - "~> 0.17.3" + - "~> 0.16.4" + - "~> 0.15.2" + - "~> 0.14.2" +--- diff --git a/advisories/_posts/2018-10-30-CVE-2018-16468.md b/advisories/_posts/2018-10-30-CVE-2018-16468.md new file mode 100644 index 00000000..948eb62d --- /dev/null +++ b/advisories/_posts/2018-10-30-CVE-2018-16468.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2018-16468 (loofah): Loofah XSS Vulnerability' +comments: false +categories: +- loofah +advisory: + gem: loofah + cve: 2018-16468 + ghsa: g4xq-jx4w-4cjv + url: https://github.com/flavorjones/loofah/issues/154 + title: Loofah XSS Vulnerability + date: 2018-10-30 + description: | + In the Loofah gem, through v2.2.2, unsanitized JavaScript may occur in + sanitized output when a crafted SVG element is republished. + cvss_v3: 6.4 + patched_versions: + - ">= 2.2.3" + related: + url: + - https://hackerone.com/reports/429267 +--- diff --git a/advisories/_posts/2018-11-05-CVE-2018-16470.md b/advisories/_posts/2018-11-05-CVE-2018-16470.md new file mode 100644 index 00000000..185b1c23 --- /dev/null +++ b/advisories/_posts/2018-11-05-CVE-2018-16470.md @@ -0,0 +1,62 @@ +--- +layout: advisory +title: 'CVE-2018-16470 (rack): Possible DoS vulnerability in Rack' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2018-16470 + ghsa: hg78-4f6x-99wq + url: https://groups.google.com/forum/#!topic/ruby-security-ann/Dz4sRl-ktKk + title: Possible DoS vulnerability in Rack + date: 2018-11-05 + description: | + There is a possible DoS vulnerability in the multipart parser in Rack. This + vulnerability has been assigned the CVE identifier CVE-2018-16470. + + Versions Affected: 2.0.4, 2.0.5 + Not affected: <= 2.0.3 + Fixed Versions: 2.0.6 + + Impact + ------ + There is a possible DoS vulnerability in the multipart parser in Rack. + Carefully crafted requests can cause the multipart parser to enter a + pathological state, causing the parser to use CPU resources disproportionate to + the request size. + + Impacted code can look something like this: + + ``` + Rack::Request.new(env).params + ``` + + But any code that uses the multi-part parser may be vulnerable. + + Rack users that have manually adjusted the buffer size in the multipart parser + may be vulnerable as well. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The 2.0.6 release is available at the normal locations. + + Workarounds + ----------- + To work around this issue, the following code can be used: + + ``` + require "rack/multipart/parser" + + Rack::Multipart::Parser.send :remove_const, :BUFSIZE + Rack::Multipart::Parser.const_set :BUFSIZE, 16384 + ``` + cvss_v3: 7.5 + unaffected_versions: + - "<= 2.0.3" + patched_versions: + - ">= 2.0.6" +--- diff --git a/advisories/_posts/2018-11-05-CVE-2018-16471.md b/advisories/_posts/2018-11-05-CVE-2018-16471.md new file mode 100644 index 00000000..1adb3471 --- /dev/null +++ b/advisories/_posts/2018-11-05-CVE-2018-16471.md @@ -0,0 +1,87 @@ +--- +layout: advisory +title: 'CVE-2018-16471 (rack): Possible XSS vulnerability in Rack' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2018-16471 + ghsa: 5r2p-j47h-mhpg + url: https://groups.google.com/forum/#!topic/ruby-security-ann/NAalCee8n6o + title: Possible XSS vulnerability in Rack + date: 2018-11-05 + description: | + There is a possible vulnerability in Rack. This vulnerability has been + assigned the CVE identifier CVE-2018-16471. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 2.0.6, 1.6.11 + + Impact + ------ + There is a possible XSS vulnerability in Rack. Carefully crafted requests can + impact the data returned by the `scheme` method on `Rack::Request`. + Applications that expect the scheme to be limited to "http" or "https" and do + not escape the return value could be vulnerable to an XSS attack. + + Vulnerable code looks something like this: + + ``` + <%= request.scheme.html_safe %> + ``` + + Note that applications using the normal escaping mechanisms provided by Rails + may not impacted, but applications that bypass the escaping mechanisms, or do + not use them may be vulnerable. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The 2.0.6 and 1.6.11 releases are available at the normal locations. + + Workarounds + ----------- + The following monkey patch can be applied to work around this issue: + + ``` + require "rack" + require "rack/request" + + class Rack::Request + SCHEME_WHITELIST = %w(https http).freeze + + def scheme + if get_header(Rack::HTTPS) == 'on' + 'https' + elsif get_header(HTTP_X_FORWARDED_SSL) == 'on' + 'https' + elsif forwarded_scheme + forwarded_scheme + else + get_header(Rack::RACK_URL_SCHEME) + end + end + + def forwarded_scheme + scheme_headers = [ + get_header(HTTP_X_FORWARDED_SCHEME), + get_header(HTTP_X_FORWARDED_PROTO).to_s.split(',')[0] + ] + + scheme_headers.each do |header| + return header if SCHEME_WHITELIST.include?(header) + end + + nil + end + end + ``` + cvss_v3: 6.1 + patched_versions: + - "~> 1.6.11" + - ">= 2.0.6" +--- diff --git a/advisories/_posts/2018-11-09-CVE-2018-1000855.md b/advisories/_posts/2018-11-09-CVE-2018-1000855.md new file mode 100644 index 00000000..3a4253c3 --- /dev/null +++ b/advisories/_posts/2018-11-09-CVE-2018-1000855.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2018-1000855 (easymon): Reflected XSS in Firefox in check endpoint' +comments: false +categories: +- easymon +advisory: + gem: easymon + cve: 2018-1000855 + ghsa: c289-47qf-rvrr + url: https://github.com/basecamp/easymon/issues/26 + title: Reflected XSS in Firefox in check endpoint + date: 2018-11-09 + description: | + When passing an invalid check name as parameter to the endpoint where + the easymon routes are mounted, a 406 response with a body that contains the invalid + check name unescaped is returned. Malicious JavaScript can be injected into that + invalid name and have it executed in Firefox + cvss_v3: 6.1 + patched_versions: + - ">= 1.4.1" + related: + url: + - https://github.com/basecamp/easymon/pull/25 +--- diff --git a/advisories/_posts/2018-11-27-CVE-2018-16476.md b/advisories/_posts/2018-11-27-CVE-2018-16476.md new file mode 100644 index 00000000..55a163fb --- /dev/null +++ b/advisories/_posts/2018-11-27-CVE-2018-16476.md @@ -0,0 +1,45 @@ +--- +layout: advisory +title: 'CVE-2018-16476 (activejob): Broken Access Control vulnerability in Active + Job' +comments: false +categories: +- activejob +- rails +advisory: + gem: activejob + framework: rails + cve: 2018-16476 + ghsa: q2qw-rmrh-vv42 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/FL4dSdzr2zw + title: Broken Access Control vulnerability in Active Job + date: 2018-11-27 + description: | + There is a vulnerability in Active Job. This vulnerability has been + assigned the CVE identifier CVE-2018-16476. + + Versions Affected: >= 4.2.0 + Not affected: < 4.2.0 + Fixed Versions: 4.2.11, 5.0.7.1, 5.1.6.1, 5.2.1.1 + + Impact + ------ + Carefully crafted user input can cause Active Job to deserialize it using GlobalId + and allow an attacker to have access to information that they should not have. + + Vulnerable code will look something like this: + + MyJob.perform_later(user_input) + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + cvss_v3: 7.5 + unaffected_versions: + - "< 4.2.0" + patched_versions: + - "~> 4.2.11" + - "~> 5.0.7.1" + - "~> 5.1.6.1" + - "~> 5.1.7" + - ">= 5.2.1.1" +--- diff --git a/advisories/_posts/2018-11-27-CVE-2018-16477.md b/advisories/_posts/2018-11-27-CVE-2018-16477.md new file mode 100644 index 00000000..72f859a5 --- /dev/null +++ b/advisories/_posts/2018-11-27-CVE-2018-16477.md @@ -0,0 +1,50 @@ +--- +layout: advisory +title: 'CVE-2018-16477 (activestorage): Bypass vulnerability in Active Storage' +comments: false +categories: +- activestorage +- rails +advisory: + gem: activestorage + framework: rails + cve: 2018-16477 + ghsa: 7rr7-rcjw-56vj + url: https://groups.google.com/forum/#!topic/rubyonrails-security/3KQRnXDIuLg + title: Bypass vulnerability in Active Storage + date: 2018-11-27 + description: | + There is a vulnerability in Active Storage. This vulnerability has been + assigned the CVE identifier CVE-2018-16477. + + Versions Affected: >= 5.2.0 + Not affected: < 5.2.0 + Fixed Versions: 5.2.1.1 + + Impact + ------ + Signed download URLs generated by `ActiveStorage` for Google Cloud Storage + service and Disk service include `content-disposition` and `content-type` + parameters that an attacker can modify. This can be used to upload specially + crafted HTML files and have them served and executed inline. Combined with + other techniques such as cookie bombing and specially crafted AppCache manifests, + an attacker can gain access to private signed URLs within a specific storage path. + + Vulnerable apps are those using either GCS or the Disk service in production. + Other storage services such as S3 or Azure aren't affected. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. For those using GCS, it's also recommended to run the + following to update existing blobs: + + ``` + ActiveStorage::Blob.find_each do |blob| + blob.send :update_service_metadata + end + ``` + cvss_v3: 6.5 + unaffected_versions: + - "< 5.2.0" + patched_versions: + - ">= 5.2.1.1" +--- diff --git a/advisories/_posts/2019-01-17-CVE-2018-20676.md b/advisories/_posts/2019-01-17-CVE-2018-20676.md new file mode 100644 index 00000000..b123a970 --- /dev/null +++ b/advisories/_posts/2019-01-17-CVE-2018-20676.md @@ -0,0 +1,38 @@ +--- +layout: advisory +title: 'CVE-2018-20676 (bootstrap): XSS vulnerability that affects bootstrap' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2018-20676 + ghsa: 3mgp-fx93-9xv5 + url: https://github.com/advisories/GHSA-3mgp-fx93-9xv5 + title: XSS vulnerability that affects bootstrap + date: 2019-01-17 + description: | + In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport + attribute. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 3.4.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-20676 + - https://github.com/twbs/bootstrap/issues/27044 + - https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 + - https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 + - https://github.com/twbs/bootstrap/pull/27047 + - https://access.redhat.com/errata/RHBA-2019:1076 + - https://access.redhat.com/errata/RHBA-2019:1570 + - https://access.redhat.com/errata/RHSA-2019:1456 + - https://access.redhat.com/errata/RHSA-2019:3023 + - https://access.redhat.com/errata/RHSA-2020:0132 + - https://access.redhat.com/errata/RHSA-2020:0133 + - https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@ + - https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d + - https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0 + - https://github.com/advisories/GHSA-3mgp-fx93-9xv5 +--- diff --git a/advisories/_posts/2019-01-17-CVE-2018-20677.md b/advisories/_posts/2019-01-17-CVE-2018-20677.md new file mode 100644 index 00000000..31ed69fb --- /dev/null +++ b/advisories/_posts/2019-01-17-CVE-2018-20677.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2018-20677 (bootstrap): bootstrap Cross-site Scripting vulnerability' +comments: false +categories: +- bootstrap +advisory: + gem: bootstrap + cve: 2018-20677 + ghsa: ph58-4vrj-w6hr + url: https://github.com/advisories/GHSA-ph58-4vrj-w6hr + title: bootstrap Cross-site Scripting vulnerability + date: 2019-01-17 + description: | + In Bootstrap before 3.4.0, XSS is possible in the affix + configuration target property. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 3.4.0" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2018-20677 + - https://github.com/twbs/bootstrap/issues/27045 + - https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906 + - https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628 + - https://github.com/twbs/bootstrap/pull/27047 + - https://access.redhat.com/errata/RHBA-2019:1076 + - https://access.redhat.com/errata/RHBA-2019:1570 + - https://access.redhat.com/errata/RHSA-2019:1456 + - https://access.redhat.com/errata/RHSA-2019:3023 + - https://access.redhat.com/errata/RHSA-2020:0132 + - https://access.redhat.com/errata/RHSA-2020:0133 + - https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@ + - https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@ + - https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d + - https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0 + - https://github.com/advisories/GHSA-ph58-4vrj-w6hr +--- diff --git a/advisories/_posts/2019-02-07-CVE-2019-5421.md b/advisories/_posts/2019-02-07-CVE-2019-5421.md new file mode 100644 index 00000000..2892d15f --- /dev/null +++ b/advisories/_posts/2019-02-07-CVE-2019-5421.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2019-5421 (devise): Devise Gem for Ruby Time-of-check Time-of-use race + condition with lockable module' +comments: false +categories: +- devise +advisory: + gem: devise + cve: 2019-5421 + ghsa: 73rf-6mrf-759q + url: https://github.com/plataformatec/devise/issues/4981 + title: Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable + module + date: 2019-02-07 + description: | + Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a + time-of-check time-of-use (TOCTOU) race condition due to `increment_failed_attempts` + within the `Devise::Models::Lockable` class not being concurrency safe. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 4.6.0" +--- diff --git a/advisories/_posts/2019-02-15-CVE-2019-8331.md b/advisories/_posts/2019-02-15-CVE-2019-8331.md new file mode 100644 index 00000000..fa65218d --- /dev/null +++ b/advisories/_posts/2019-02-15-CVE-2019-8331.md @@ -0,0 +1,35 @@ +--- +layout: advisory +title: 'CVE-2019-8331 (twitter-bootstrap-rails): twitter-bootstrap-rails vulnerable + to Cross-Site Scripting (XSS)' +comments: false +categories: +- twitter-bootstrap-rails +advisory: + gem: twitter-bootstrap-rails + cve: 2019-8331 + ghsa: 9v3m-8fp8-mj99 + url: https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/ + title: twitter-bootstrap-rails vulnerable to Cross-Site Scripting (XSS) + date: 2019-02-15 + description: | + The seyhunak/twitter-bootstrap-rails gem includes a vendored version of + the Bootstrap JavaScript library. + + In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible + in the tooltip or popover data-template attribute. + + The most recent version of this gem, 5.0.0, includes Bootstrap v 3.3.6. + All versions of Bootstrap before v 3.4.1 are affected by this vulnerability. + All versions of this gem are affected. + + # Workarounds + Until this gem is updated to use Bootstrap v3.4.1, users can replace it + with the official Twitter-maintained gems, `bootstrap-sass` (version 3.4.1) + or `bootstrap` (bootstrap 4 and 5). + cvss_v2: 4.3 + cvss_v3: 6.1 + related: + url: + - https://github.com/twbs/bootstrap-sass/releases/tag/v3.4.1 +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8320.md b/advisories/_posts/2019-03-05-CVE-2019-8320.md new file mode 100644 index 00000000..85717233 --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8320.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2019-8320 (rubygems-update): Delete directory using symlink when decompressing + tar' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8320 + ghsa: 5x32-c9mf-49cc + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Delete directory using symlink when decompressing tar + date: 2019-03-05 + description: | + A Directory Traversal issue was discovered in RubyGems 2.7.6 and later + through 3.0.2. Before making new directories or touching files (which now + include path-checking code for symlinks), it would delete the target + destination. If that destination was hidden behind a symlink, a malicious gem + could delete arbitrary files on the user’s machine, presuming the attacker + could guess at paths. Given how frequently gem is run as sudo, and how + predictable paths are on modern systems (/tmp, /usr, etc.), this could + likely lead to data loss or an unusable system. + cvss_v3: 7.4 + unaffected_versions: + - "< 2.7.6" + patched_versions: + - ">= 3.0.3" + - "~> 2.7.9" +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8321.md b/advisories/_posts/2019-03-05-CVE-2019-8321.md new file mode 100644 index 00000000..081187f4 --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8321.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2019-8321 (rubygems-update): Escape sequence injection vulnerability in + verbose' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8321 + ghsa: fr32-gr5c-xq5c + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Escape sequence injection vulnerability in verbose + date: 2019-03-05 + description: | + An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since + Gem::UserInteraction#verbose calls say without escaping, escape sequence + injection is possible. + cvss_v3: 7.5 + unaffected_versions: + - "< 2.6" + patched_versions: + - ">= 3.0.3" + - "~> 2.7.9" +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8322.md b/advisories/_posts/2019-03-05-CVE-2019-8322.md new file mode 100644 index 00000000..8a9e03eb --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8322.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2019-8322 (rubygems-update): Escape sequence injection vulnerability in + gem owner' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8322 + ghsa: mh37-8c3g-3fgc + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Escape sequence injection vulnerability in gem owner + date: 2019-03-05 + description: | + An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem + owner command outputs the contents of the API response directly to stdout. + Therefore, if the response is crafted, escape sequence injection may occur. + cvss_v3: 7.5 + unaffected_versions: + - "< 2.6" + patched_versions: + - "~> 2.7.9" + - ">= 3.0.3" +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8323.md b/advisories/_posts/2019-03-05-CVE-2019-8323.md new file mode 100644 index 00000000..a7c41697 --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8323.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2019-8323 (rubygems-update): Escape sequence injection vulnerability in + api response handling' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8323 + ghsa: 3h4r-pjv6-cph9 + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Escape sequence injection vulnerability in api response handling + date: 2019-03-05 + description: | + An issue was discovered in RubyGems 2.6 and later through 3.0.2. + Gem::GemcutterUtilities#with_response may output the API response to stdout + as it is. Therefore, if the API side modifies the response, escape sequence + injection may occur. + cvss_v3: 7.5 + unaffected_versions: + - "< 2.6" + patched_versions: + - ">= 3.0.3" + - "~> 2.7.9" +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8324.md b/advisories/_posts/2019-03-05-CVE-2019-8324.md new file mode 100644 index 00000000..cfc7e736 --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8324.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2019-8324 (rubygems-update): Installing a malicious gem may lead to arbitrary + code execution' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8324 + ghsa: 76wm-422q-92mq + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Installing a malicious gem may lead to arbitrary code execution + date: 2019-03-05 + description: | + An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted + gem with a multi-line name is not handled correctly. Therefore, an attacker + could inject arbitrary code to the stub line of gemspec, which is eval-ed by + code in ensure_loadable_spec during the preinstall check. + cvss_v3: 8.8 + unaffected_versions: + - "< 2.6" + patched_versions: + - ">= 3.0.3" + - "~> 2.7.9" +--- diff --git a/advisories/_posts/2019-03-05-CVE-2019-8325.md b/advisories/_posts/2019-03-05-CVE-2019-8325.md new file mode 100644 index 00000000..820f094d --- /dev/null +++ b/advisories/_posts/2019-03-05-CVE-2019-8325.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2019-8325 (rubygems-update): Escape sequence injection vulnerability in + errors' +comments: false +categories: +- rubygems-update +- rubygems +advisory: + gem: rubygems-update + library: rubygems + cve: 2019-8325 + ghsa: 4wm8-fjv7-j774 + url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html + title: Escape sequence injection vulnerability in errors + date: 2019-03-05 + description: | + An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since + Gem::CommandManager#run calls alert_error without escaping, escape sequence + injection is possible. (There are many ways to cause an error.) + cvss_v3: 7.5 + unaffected_versions: + - "< 2.6" + patched_versions: + - ">= 3.0.3" + - "~> 2.7.9" +--- diff --git a/advisories/_posts/2019-03-08-CVE-2018-6517.md b/advisories/_posts/2019-03-08-CVE-2018-6517.md new file mode 100644 index 00000000..ad5a7f7f --- /dev/null +++ b/advisories/_posts/2019-03-08-CVE-2018-6517.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2018-6517 (chloride): Improper handling of ssh known_hosts file with Chloride' +comments: false +categories: +- chloride +advisory: + gem: chloride + cve: 2018-6517 + ghsa: 573x-jhqh-jg36 + url: https://puppet.com/security/cve/CVE-2018-6517 + title: Improper handling of ssh known_hosts file with Chloride + date: 2019-03-08 + description: | + Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints + for previously unknown hosts getting added to the user's known_hosts file without + confirmation. In version 0.3.0 this is updated so that the user's known_hosts file + is not updated by chloride. + cvss_v3: 5.0 + patched_versions: + - ">= 0.3.0" +--- diff --git a/advisories/_posts/2019-03-13-CVE-2019-5418.md b/advisories/_posts/2019-03-13-CVE-2019-5418.md new file mode 100644 index 00000000..c4b8aedf --- /dev/null +++ b/advisories/_posts/2019-03-13-CVE-2019-5418.md @@ -0,0 +1,105 @@ +--- +layout: advisory +title: 'CVE-2019-5418 (actionview): File Content Disclosure in Action View' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2019-5418 + ghsa: 86g5-2wh3-gc9j + url: https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q + title: File Content Disclosure in Action View + date: 2019-03-13 + description: | + There is a possible file content disclosure vulnerability in Action View. This + vulnerability has been assigned the CVE identifier CVE-2019-5418. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, 4.2.11.1 + + Impact + ------ + There is a possible file content disclosure vulnerability in Action View. + Specially crafted accept headers in combination with calls to `render file:` + can cause arbitrary files on the target server to be rendered, disclosing the + file contents. + + The impact is limited to calls to `render` which render file contents without + a specified accept format. Impacted code in a controller looks something like + this: + + ``` + class UserController < ApplicationController + def index + render file: "#{Rails.root}/some/file" + end + end + ``` + + Rendering templates as opposed to files is not impacted by this vulnerability. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are + available at the normal locations. + + Workarounds + ----------- + This vulnerability can be mitigated by specifying a format for file rendering, + like this: + + ``` + class UserController < ApplicationController + def index + render file: "#{Rails.root}/some/file", formats: [:html] + end + end + ``` + + In summary, impacted calls to `render` look like this: + + ``` + render file: "#{Rails.root}/some/file" + ``` + + The vulnerability can be mitigated by changing to this: + + ``` + render file: "#{Rails.root}/some/file", formats: [:html] + ``` + + Other calls to `render` are not impacted. + + Alternatively, the following monkey patch can be applied in an initializer: + + ``` + $ cat config/initializers/formats_filter.rb + # frozen_string_literal: true + + ActionDispatch::Request.prepend(Module.new do + def formats + super().select do |format| + format.symbol || format.ref == "*/*" + end + end + end) + ``` + + Credits + ------- + Thanks to John Hawthorn of GitHub + cvss_v3: 7.5 + patched_versions: + - "~> 4.2.11, >= 4.2.11.1" + - "~> 5.0.7, >= 5.0.7.2" + - "~> 5.1.6, >= 5.1.6.2" + - "~> 5.2.2, >= 5.2.2.1" + - ">= 6.0.0.beta3" +--- diff --git a/advisories/_posts/2019-03-13-CVE-2019-5419.md b/advisories/_posts/2019-03-13-CVE-2019-5419.md new file mode 100644 index 00000000..ef34c9e0 --- /dev/null +++ b/advisories/_posts/2019-03-13-CVE-2019-5419.md @@ -0,0 +1,101 @@ +--- +layout: advisory +title: 'CVE-2019-5419 (actionview): Denial of Service Vulnerability in Action View' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2019-5419 + ghsa: m63j-wh5w-c252 + url: https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI + title: Denial of Service Vulnerability in Action View + date: 2019-03-13 + description: | + There is a potential denial of service vulnerability in actionview. + This vulnerability has been assigned the CVE identifier CVE-2019-5419. + + Impact + ------ + Specially crafted accept headers can cause the Action View template location + code to consume 100% CPU, causing the server unable to process requests. This + impacts all Rails applications that render views. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Workarounds + ----------- + This vulnerability can be mitigated by wrapping `render` calls with + `respond_to` blocks. For example, the following example is vulnerable: + + ``` + class UserController < ApplicationController + def index + render "index" + end + end + ``` + + But the following code is not vulnerable: + + ``` + class UserController < ApplicationController + def index + respond_to |format| + format.html { render "index" } + end + end + end + ``` + + Implicit rendering is impacted, so this code is vulnerable: + + ``` + class UserController < ApplicationController + def index + end + end + ``` + + But can be changed this this: + + ``` + class UserController < ApplicationController + def index + respond_to |format| + format.html { render "index" } + end + end + end + ``` + + Alternatively to specifying the format, the following monkey patch can be + applied in an initializer: + + ``` + $ cat config/initializers/formats_filter.rb + # frozen_string_literal: true + + ActionDispatch::Request.prepend(Module.new do + def formats + super().select do |format| + format.symbol || format.ref == "*/*" + end + end + end) + ``` + + Credits + ------- + Thanks to John Hawthorn of GitHub + cvss_v3: 7.5 + patched_versions: + - ">= 6.0.0.beta3" + - "~> 5.2.2, >= 5.2.2.1" + - "~> 5.1.6, >= 5.1.6.2" + - "~> 5.0.7, >= 5.0.7.2" + - "~> 4.2.11, >= 4.2.11.1" +--- diff --git a/advisories/_posts/2019-03-13-CVE-2019-5420.md b/advisories/_posts/2019-03-13-CVE-2019-5420.md new file mode 100644 index 00000000..c7a4e74e --- /dev/null +++ b/advisories/_posts/2019-03-13-CVE-2019-5420.md @@ -0,0 +1,56 @@ +--- +layout: advisory +title: 'CVE-2019-5420 (railties): Possible Remote Code Execution Exploit in Rails + Development Mode' +comments: false +categories: +- railties +- rails +advisory: + gem: railties + framework: rails + cve: 2019-5420 + ghsa: m42h-mh85-4qgc + url: https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw + title: Possible Remote Code Execution Exploit in Rails Development Mode + date: 2019-03-13 + description: | + There is a possible a possible remote code executing exploit in Rails when in + development mode. This vulnerability has been assigned the CVE identifier + CVE-2019-5420. + + Versions Affected: 6.0.0.X, 5.2.X. + Not affected: < 5.2.0 + Fixed Versions: 6.0.0.beta3, 5.2.2.1 + + Impact + ------ + With some knowledge of a target application it is possible for an attacker to + guess the automatically generated development mode secret token. This secret + token can be used in combination with other Rails internals to escalate to a + remote code execution exploit. + + All users running an affected release should either upgrade or use one of the + workarounds immediately. + + Releases + -------- + The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations. + + Workarounds + ----------- + This issue can be mitigated by specifying a secret key in development mode. + In "config/environments/development.rb" add this: + + config.secret_key_base = SecureRandom.hex(64) + + Credits + ------- + Thanks to ooooooo_q + cvss_v3: 9.8 + unaffected_versions: + - "< 5.2.0" + patched_versions: + - "~> 5.2.2, >= 5.2.2.1" + - ">= 6.0.0.beta3" +--- diff --git a/advisories/_posts/2019-03-25-CVE-2019-9837.md b/advisories/_posts/2019-03-25-CVE-2019-9837.md new file mode 100644 index 00000000..24a907fa --- /dev/null +++ b/advisories/_posts/2019-03-25-CVE-2019-9837.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2019-9837 (doorkeeper-openid_connect): Doorkeeper::OpenidConnect Open + Redirect' +comments: false +categories: +- doorkeeper-openid_connect +advisory: + gem: doorkeeper-openid_connect + cve: 2019-9837 + ghsa: vv4c-g6q7-p3q7 + url: https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md#v154-2019-02-15 + title: Doorkeeper::OpenidConnect Open Redirect + date: 2019-03-25 + description: | + Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) + 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in + an OAuth authorization request (that results in an error response) with the 'openid' + scope and a prompt=none value. This allows phishing attacks against the authorization + flow. + cvss_v3: 6.1 + unaffected_versions: + - "< 1.4.0" + patched_versions: + - ">= 1.5.4" +--- diff --git a/advisories/_posts/2019-04-04-CVE-2019-10842.md b/advisories/_posts/2019-04-04-CVE-2019-10842.md new file mode 100644 index 00000000..a7d8a18d --- /dev/null +++ b/advisories/_posts/2019-04-04-CVE-2019-10842.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'CVE-2019-10842 (bootstrap-sass): Remote code execution in bootstrap-sass' +comments: false +categories: +- bootstrap-sass +advisory: + gem: bootstrap-sass + cve: 2019-10842 + ghsa: vqqv-v9m2-48p2 + url: https://github.com/twbs/bootstrap-sass/issues/1195 + title: Remote code execution in bootstrap-sass + date: 2019-04-04 + description: | + Arbitrary code execution (via backdoor code, when + downloaded from rubygems.org) was discovered in + bootstrap-sass 3.2.0.3. + + Users are advised to upgrade immediately to 3.2.0.4 + + An unauthenticated attacker can craft the ___cfduid cookie value + with base64 arbitrary code to be executed via eval(), which can + be leveraged to execute arbitrary code on the target system. + (Note that there are three underscore characters in the cookie name. + This is unrelated to the __cfduid cookie that is legitimately used by + Cloudflare.) + cvss_v3: 9.8 + unaffected_versions: + - "<= 3.2.0.2" + patched_versions: + - ">= 3.2.0.4" +--- diff --git a/advisories/_posts/2019-04-10-CVE-2019-16060.md b/advisories/_posts/2019-04-10-CVE-2019-16060.md new file mode 100644 index 00000000..5d35d99b --- /dev/null +++ b/advisories/_posts/2019-04-10-CVE-2019-16060.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2019-16060 (airbrake-ruby): Blacklist keys are no longer being filtered + in airbrake-ruby' +comments: false +categories: +- airbrake-ruby +advisory: + gem: airbrake-ruby + cve: 2019-16060 + ghsa: 2p82-v77v-mppr + url: https://github.com/airbrake/airbrake-ruby/issues/468 + title: Blacklist keys are no longer being filtered in airbrake-ruby + date: 2019-04-10 + description: | + A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered + prior to sending to Airbrake. Such data could be user passwords. Therefore, an app + could leak user passwords without knowing it. + cvss_v3: 9.8 + unaffected_versions: + - "< 4.2.3" + - "> 4.2.3" + patched_versions: + - ">= 4.2.4" + related: + url: + - https://github.com/airbrake/airbrake-ruby/pull/469 +--- diff --git a/advisories/_posts/2019-04-19-CVE-2019-11358.md b/advisories/_posts/2019-04-19-CVE-2019-11358.md new file mode 100644 index 00000000..4dbc9ab0 --- /dev/null +++ b/advisories/_posts/2019-04-19-CVE-2019-11358.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2019-11358 (jquery-rails): Prototype pollution attack through jQuery $.extend' +comments: false +categories: +- jquery-rails +- rails +advisory: + gem: jquery-rails + framework: rails + cve: 2019-11358 + ghsa: 6c3j-c64m-qhgq + url: https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/ + title: Prototype pollution attack through jQuery $.extend + date: 2019-04-19 + description: | + jQuery before 3.4.0 mishandles jQuery.extend(true, {}, ...) because of + bject.prototype pollution. If an unsanitized source object contained an + enumerable __proto__ property, it could extend the native Object.prototype. + cvss_v2: 4.3 + cvss_v3: 6.1 + patched_versions: + - ">= 4.3.4" + related: + url: + - https://hackerone.com/reports/454365 + - https://github.com/jquery/jquery/pull/4333 + - https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b + - https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#434 +--- diff --git a/advisories/_posts/2019-04-22-CVE-2019-11068.md b/advisories/_posts/2019-04-22-CVE-2019-11068.md new file mode 100644 index 00000000..2178b2c3 --- /dev/null +++ b/advisories/_posts/2019-04-22-CVE-2019-11068.md @@ -0,0 +1,57 @@ +--- +layout: advisory +title: 'CVE-2019-11068 (nokogiri): Nokogiri gem, via libxslt, is affected by improper + access control vulnerability' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2019-11068 + ghsa: qxcg-xjjg-66mj + url: https://github.com/sparklemotion/nokogiri/issues/1892 + title: Nokogiri gem, via libxslt, is affected by improper access control vulnerability + date: 2019-04-22 + description: | + Nokogiri v1.10.3 has been released. + + This is a security release. It addresses a CVE in upstream libxslt rated as + "Priority: medium" by Canonical, and "NVD Severity: high" by Debian. More + details are available below. + + If you're using your distro's system libraries, rather than Nokogiri's + vendored libraries, there's no security need to upgrade at this time, though + you may want to check with your distro whether they've patched this + (Canonical has patched Ubuntu packages). Note that this patch is not yet (as + of 2019-04-22) in an upstream release of libxslt. + + Full details about the security update are available in Github Issue + [#1892] https://github.com/sparklemotion/nokogiri/issues/1892. + + --- + + CVE-2019-11068 + + Permalinks are: + - Canonical: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11068 + - Debian: https://security-tracker.debian.org/tracker/CVE-2019-11068 + + Description: + + > libxslt through 1.1.33 allows bypass of a protection mechanism + > because callers of xsltCheckRead and xsltCheckWrite permit access + > even upon receiving a -1 error code. xsltCheckRead can return -1 for + > a crafted URL that is not actually invalid and is subsequently + > loaded. + + Canonical rates this as "Priority: Medium". + + Debian rates this as "NVD Severity: High (attack range: remote)". + cvss_v3: 9.8 + patched_versions: + - ">= 1.10.3" + related: + url: + - https://groups.google.com/forum/#!msg/ruby-security-ann/_y80o1zZlOs/k4SDX6hoAAAJ + - https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6 +--- diff --git a/advisories/_posts/2019-06-04-CVE-2019-12732.md b/advisories/_posts/2019-06-04-CVE-2019-12732.md new file mode 100644 index 00000000..471c7381 --- /dev/null +++ b/advisories/_posts/2019-06-04-CVE-2019-12732.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2019-12732 (chartkick): XSS Vulnerability in Chartkick Ruby Gem' +comments: false +categories: +- chartkick +advisory: + gem: chartkick + cve: 2019-12732 + ghsa: g45g-g52h-39rg + url: https://github.com/ankane/chartkick/issues/488 + title: XSS Vulnerability in Chartkick Ruby Gem + date: 2019-06-04 + description: | + Chartkick is vulnerable to a cross-site scripting (XSS) attack if + both the following conditions are met: + + Condition 1: + It's used with `ActiveSupport.escape_html_entities_in_json = false` + (this is not the default for Rails) + OR used with a non-Rails framework like Sinatra. + + Condition 2: + Untrusted data or options are passed to a chart. + + <%= line_chart params[:data], min: params[:min] %> + cvss_v3: 4.7 + patched_versions: + - ">= 3.2.0" +--- diff --git a/advisories/_posts/2019-06-13-CVE-2019-11027.md b/advisories/_posts/2019-06-13-CVE-2019-11027.md new file mode 100644 index 00000000..c838eb60 --- /dev/null +++ b/advisories/_posts/2019-06-13-CVE-2019-11027.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2019-11027 (ruby-openid): ruby-openid SSRF via claimed_id request' +comments: false +categories: +- ruby-openid +advisory: + gem: ruby-openid + cve: 2019-11027 + ghsa: fqfj-cmh6-hj49 + url: https://github.com/openid/ruby-openid/issues/122 + date: 2019-06-13 + title: ruby-openid SSRF via claimed_id request + description: | + Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable + flaw. This library is used by Rails web applications to integrate with OpenID Providers. + Severity can range from medium to critical, depending on how a web application developer + chose to employ the ruby-openid library. Developers who based their OpenID integration + heavily on the "example app" provided by the project are at highest risk. + cvss_v3: 9.8 + patched_versions: + - ">= 2.9.0" +--- diff --git a/advisories/_posts/2019-07-01-CVE-2019-13146.md b/advisories/_posts/2019-07-01-CVE-2019-13146.md new file mode 100644 index 00000000..dc7c8598 --- /dev/null +++ b/advisories/_posts/2019-07-01-CVE-2019-13146.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2019-13146 (field_test): Arbitrary Variants Via Query Parameters' +comments: false +categories: +- field_test +advisory: + gem: field_test + cve: 2019-13146 + ghsa: wg9m-gw3h-hg83 + url: https://github.com/ankane/field_test/issues/17 + title: Arbitrary Variants Via Query Parameters + date: 2019-07-01 + description: | + Due to unvalidated input, an attacker can pass in + arbitrary variants via query parameters. + + If an application treats variants as trusted, this can + lead to potential vulnerabilities like SQL injection + or cross-site scripting (XSS). For instance: + + landing_page = field_test(:landing_page) + Page.where("key = '#{landing_page}'") + cvss_v3: 5.3 + unaffected_versions: + - "< 0.3.0" + patched_versions: + - ">= 0.3.1" +--- diff --git a/advisories/_posts/2019-07-02-CVE-2019-1020001.md b/advisories/_posts/2019-07-02-CVE-2019-1020001.md new file mode 100644 index 00000000..d022fdcc --- /dev/null +++ b/advisories/_posts/2019-07-02-CVE-2019-1020001.md @@ -0,0 +1,30 @@ +--- +layout: advisory +title: 'CVE-2019-1020001 (yard): Arbitrary path traversal and file access via `yard + server`' +comments: false +categories: +- yard +advisory: + gem: yard + cve: 2019-1020001 + ghsa: xfhh-rx56-rxcr + url: https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr + date: 2019-07-02 + title: Arbitrary path traversal and file access via `yard server` + description: | + A path traversal vulnerability was discovered in YARD <= 0.9.19 when using + `yard server` to serve documentation. This bug would allow unsanitized HTTP + requests to access arbitrary files on the machine of a yard server host under + certain conditions. + + The issue is resolved in v0.9.20 and later. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 0.9.20" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2019-1020001 + - https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr +--- diff --git a/advisories/_posts/2019-07-02-GHSA-xfhh-rx56-rxcr.md b/advisories/_posts/2019-07-02-GHSA-xfhh-rx56-rxcr.md new file mode 100644 index 00000000..2b3feecf --- /dev/null +++ b/advisories/_posts/2019-07-02-GHSA-xfhh-rx56-rxcr.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'GHSA-xfhh-rx56-rxcr (yard): Possible arbitrary path traversal and file access + via `yard server`' +comments: false +categories: +- yard +advisory: + gem: yard + ghsa: xfhh-rx56-rxcr + date: 2019-07-02 + url: https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr + title: Possible arbitrary path traversal and file access via `yard server` + description: | + A path traversal vulnerability was discovered in YARD <= 0.9.19 when + using `yard server` to serve documentation. This bug would allow unsanitized HTTP + requests to access arbitrary files on the machine of a yard server host under certain + conditions. + patched_versions: + - ">= 0.9.20" +--- diff --git a/advisories/_posts/2019-07-05-CVE-2019-13354.md b/advisories/_posts/2019-07-05-CVE-2019-13354.md new file mode 100644 index 00000000..f125d2ba --- /dev/null +++ b/advisories/_posts/2019-07-05-CVE-2019-13354.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2019-13354 (strong_password): strong_password Ruby gem malicious version + causing Remote Code Execution vulnerability' +comments: false +categories: +- strong_password +advisory: + gem: strong_password + cve: 2019-13354 + ghsa: 5h5r-ffc4-c455 + url: https://withatwist.dev/strong-password-rubygem-hijacked.html + title: strong_password Ruby gem malicious version causing Remote Code Execution + vulnerability + date: 2019-07-05 + description: | + The `strong_password` gem on RubyGems.org was hijacked by a malicious actor. The + malicious actor published v0.0.7 containing malicious code that enables an attacker + to execute remote code in production. + + Upgrade `strong_password` to v0.0.8 to ensure no malicious code execution is possible. + cvss_v3: 9.8 + unaffected_versions: + - "< 0.0.7" + patched_versions: + - ">= 0.0.8" +--- diff --git a/advisories/_posts/2019-07-12-CVE-2019-13574.md b/advisories/_posts/2019-07-12-CVE-2019-13574.md new file mode 100644 index 00000000..47701bf7 --- /dev/null +++ b/advisories/_posts/2019-07-12-CVE-2019-13574.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2019-13574 (mini_magick): Remote command execution via filename' +comments: false +categories: +- mini_magick +advisory: + gem: mini_magick + cve: 2019-13574 + ghsa: r7j3-vvh2-xrpj + url: https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/ + title: Remote command execution via filename + date: 2019-07-12 + description: | + A remote shell execution vulnerability when using MiniMagick::Image.open with URL coming from unsanitized user input. + e.g. `MiniMagick::Image.open("| touch.txt")` + cvss_v3: 7.5 + patched_versions: + - ">= 4.9.4" + related: + url: + - https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851 +--- diff --git a/advisories/_posts/2019-07-16-CVE-2019-1010306.md b/advisories/_posts/2019-07-16-CVE-2019-1010306.md new file mode 100644 index 00000000..2633cc91 --- /dev/null +++ b/advisories/_posts/2019-07-16-CVE-2019-1010306.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2019-1010306 (slanger): Arbitrary command execution in slanger' +comments: false +categories: +- slanger +advisory: + gem: slanger + cve: 2019-1010306 + ghsa: rg32-m3hf-772v + url: https://github.com/stevegraham/slanger/pull/238 + date: 2019-07-16 + title: Arbitrary command execution in slanger + description: | + A remote attacker can execute arbitrary commands by sending a crafted request to the server. + + This is due to the use of `Oj.load` instead of `Oj.strict_load` when processing messages. + + Note that `slanger` is no longer maintained. + patched_versions: + - ">= 0.6.1" + cvss_v3: 9.8 +--- diff --git a/advisories/_posts/2019-07-16-CVE-2019-13589.md b/advisories/_posts/2019-07-16-CVE-2019-13589.md new file mode 100644 index 00000000..83f6f093 --- /dev/null +++ b/advisories/_posts/2019-07-16-CVE-2019-13589.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2019-13589 (paranoid2): Code backdoor in paranoid2' +comments: false +categories: +- paranoid2 +advisory: + gem: paranoid2 + cve: 2019-13589 + ghsa: 4g4c-8gqh-m4vm + url: https://github.com/rubygems/rubygems.org/issues/2051 + date: 2019-07-16 + title: Code backdoor in paranoid2 + description: | + The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included + a code-execution backdoor inserted by a third party. + + The current version, without this backdoor, is 1.1.5. + cvss_v3: 9.8 + unaffected_versions: + - "> 1.1.6" + - "< 1.1.6" +--- diff --git a/advisories/_posts/2019-07-26-CVE-2019-1010191.md b/advisories/_posts/2019-07-26-CVE-2019-1010191.md new file mode 100644 index 00000000..1a42371e --- /dev/null +++ b/advisories/_posts/2019-07-26-CVE-2019-1010191.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2019-1010191 (marginalia): SQL injection vulnerability via Marginalia::Comment' +comments: false +categories: +- marginalia +advisory: + gem: marginalia + cve: 2019-1010191 + ghsa: hrj5-qp7x-rpg6 + url: https://github.com/basecamp/marginalia/pull/73 + title: SQL injection vulnerability via Marginalia::Comment + date: 2019-07-26 + description: | + The 'marginalia' gem is affected by a SQL Injection vulnerability. All SQL + queries are affected when a user controller argument is added as a component. + + This affects users that add a component that is user controller, for instance + a parameter or a header. + + The issue is resolved in version 1.6. + cvss_v3: 9.8 + patched_versions: + - ">= 1.6" +--- diff --git a/advisories/_posts/2019-07-31-CVE-2018-20857.md b/advisories/_posts/2019-07-31-CVE-2018-20857.md new file mode 100644 index 00000000..3df09de1 --- /dev/null +++ b/advisories/_posts/2019-07-31-CVE-2018-20857.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2018-20857 (samlr): samlr XML nodes comment attack' +comments: false +categories: +- samlr +advisory: + gem: samlr + cve: 2018-20857 + ghsa: qpxp-5j56-gg3x + url: https://github.com/zendesk/samlr/pull/29 + date: 2019-07-31 + title: samlr XML nodes comment attack + description: | + Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as + a name_id node with user@example.com followed by . and then the attacker's + domain name. + cvss_v3: 7.5 + patched_versions: + - ">= 2.6.2" +--- diff --git a/advisories/_posts/2019-07-31-CVE-2019-14281.md b/advisories/_posts/2019-07-31-CVE-2019-14281.md new file mode 100644 index 00000000..153c2832 --- /dev/null +++ b/advisories/_posts/2019-07-31-CVE-2019-14281.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-14281 (datagrid): Code execution backdoor in datagrid' +comments: false +categories: +- datagrid +advisory: + gem: datagrid + cve: 2019-14281 + ghsa: rqp5-pg7w-832p + url: https://github.com/rubygems/rubygems.org/issues/2072 + date: 2019-07-31 + title: Code execution backdoor in datagrid + description: | + The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included + a code-execution backdoor inserted by a third party. + unaffected_versions: + - "< 1.0.6" + - "> 1.0.6" + cvss_v3: 9.8 +--- diff --git a/advisories/_posts/2019-07-31-CVE-2019-14282.md b/advisories/_posts/2019-07-31-CVE-2019-14282.md new file mode 100644 index 00000000..4359fb8c --- /dev/null +++ b/advisories/_posts/2019-07-31-CVE-2019-14282.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-14282 (simple_captcha2): Code backdoor in simple_captcha2' +comments: false +categories: +- simple_captcha2 +advisory: + gem: simple_captcha2 + cve: 2019-14282 + ghsa: wg6j-r28m-7293 + url: https://github.com/rubygems/rubygems.org/issues/2073 + title: Code backdoor in simple_captcha2 + date: 2019-07-31 + description: | + The simple_captcha2 gem 0.2.3 for Ruby, as distributed on RubyGems.org, + included a code-execution backdoor inserted by a third party. + cvss_v3: 9.8 + unaffected_versions: + - "< 0.2.3" + - "> 0.2.3" +--- diff --git a/advisories/_posts/2019-08-11-CVE-2019-5477.md b/advisories/_posts/2019-08-11-CVE-2019-5477.md new file mode 100644 index 00000000..3bba01c7 --- /dev/null +++ b/advisories/_posts/2019-08-11-CVE-2019-5477.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2019-5477 (rexical): Rexical Command Injection Vulnerability' +comments: false +categories: +- rexical +advisory: + gem: rexical + cve: 2019-5477 + ghsa: cr5j-953j-xw5p + url: https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926 + title: Rexical Command Injection Vulnerability + date: 2019-08-11 + description: | + A command injection vulnerability appears in code generated by the Rexical + gem versions v1.0.6 and earlier. It allows commands to be executed in a + subprocess by Ruby's `Kernel.open` method. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 1.0.7" + related: + url: + - https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc#107--2019-08-06 + - https://groups.google.com/forum/#!msg/ruby-security-ann/YMnKFsASOAE/Fw3ocLI0BQAJ +--- diff --git a/advisories/_posts/2019-08-19-CVE-2019-15224.md b/advisories/_posts/2019-08-19-CVE-2019-15224.md new file mode 100644 index 00000000..679c2a74 --- /dev/null +++ b/advisories/_posts/2019-08-19-CVE-2019-15224.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-15224 (rest-client): Code execution backdoor in rest-client' +comments: false +categories: +- rest-client +advisory: + gem: rest-client + cve: 2019-15224 + ghsa: 333g-rpr4-7hxq + url: https://github.com/rest-client/rest-client/issues/713 + title: Code execution backdoor in rest-client + date: 2019-08-19 + description: | + The rest-client gem 1.6.13 for Ruby, as distributed on RubyGems.org, + included a code-execution backdoor inserted by a third party. + cvss_v3: 9.8 + unaffected_versions: + - "<= 1.6.9" + - ">= 1.6.14" +--- diff --git a/advisories/_posts/2019-08-20-CVE-2019-15224.md b/advisories/_posts/2019-08-20-CVE-2019-15224.md new file mode 100644 index 00000000..29f6435b --- /dev/null +++ b/advisories/_posts/2019-08-20-CVE-2019-15224.md @@ -0,0 +1,27 @@ +--- +layout: advisory +title: 'CVE-2019-15224 (omniauth_amazon): Code execution backdoor in omniauth_amazon' +comments: false +categories: +- omniauth_amazon +advisory: + gem: omniauth_amazon + cve: 2019-15224 + ghsa: 333g-rpr4-7hxq + url: https://github.com/rubygems.org/issues/2097 + title: Code execution backdoor in omniauth_amazon + date: 2019-08-20 + description: | + The omniauth_amazon gem 1.0.1 for Ruby, as distributed on RubyGems.org, included a + code-execution backdoor inserted by a third party. + + Users of an affected version should consider downgrading to the last non-affected version of + 1.0.1. + cvss_v3: 9.8 + unaffected_versions: + - "< 1.0.1" + - "> 1.0.1" + related: + url: + - https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019 +--- diff --git a/advisories/_posts/2019-08-21-CVE-2018-20975.md b/advisories/_posts/2019-08-21-CVE-2018-20975.md new file mode 100644 index 00000000..8212b341 --- /dev/null +++ b/advisories/_posts/2019-08-21-CVE-2018-20975.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2018-20975 (fat_free_crm): fat_free_crm XSS via query parameter of tags_helper + method' +comments: false +categories: +- fat_free_crm +advisory: + gem: fat_free_crm + cve: 2018-20975 + ghsa: 4p8f-mmfj-r45g + url: https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65 + date: 2019-08-21 + title: fat_free_crm XSS via query parameter of tags_helper method + description: 'Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb. + + ' + cvss_v3: 6.1 + patched_versions: + - ">= 0.18.1" +--- diff --git a/advisories/_posts/2019-08-29-CVE-2020-8130.md b/advisories/_posts/2019-08-29-CVE-2020-8130.md new file mode 100644 index 00000000..ca01184a --- /dev/null +++ b/advisories/_posts/2019-08-29-CVE-2020-8130.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2020-8130 (rake): OS Command Injection in Rake' +comments: false +categories: +- rake +advisory: + gem: rake + cve: 2020-8130 + ghsa: jppv-gw3r-w3q8 + date: 2019-08-29 + url: https://github.com/advisories/GHSA-jppv-gw3r-w3q8 + title: OS Command Injection in Rake + description: | + There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in + Rake::FileList when supplying a filename that begins with the pipe character + `|`. + cvss_v2: 9.3 + cvss_v3: 8.1 + patched_versions: + - ">= 12.3.3" +--- diff --git a/advisories/_posts/2019-09-08-CVE-2019-16109.md b/advisories/_posts/2019-09-08-CVE-2019-16109.md new file mode 100644 index 00000000..42f44e1d --- /dev/null +++ b/advisories/_posts/2019-09-08-CVE-2019-16109.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2019-16109 (devise): Devise Gem for Ruby confirmation token validation + with a blank string' +comments: false +categories: +- devise +advisory: + gem: devise + cve: 2019-16109 + ghsa: fcjw-8rhj-gwwc + url: https://github.com/plataformatec/devise/issues/5071 + title: Devise Gem for Ruby confirmation token validation with a blank string + date: 2019-09-08 + description: | + Devise before 4.7.1 confirms accounts upon receiving a request with a blank + confirmation_token, if a database record has a blank value in the confirmation_token column. + However, there is no scenario within Devise itself in which such database records would exist. + cvss_v3: 5.3 + patched_versions: + - ">= 4.7.1" +--- diff --git a/advisories/_posts/2019-09-12-CVE-2019-16892.md b/advisories/_posts/2019-09-12-CVE-2019-16892.md new file mode 100644 index 00000000..35c4e5b0 --- /dev/null +++ b/advisories/_posts/2019-09-12-CVE-2019-16892.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2019-16892 (rubyzip): Denial of Service in rubyzip ("zip bombs")' +comments: false +categories: +- rubyzip +advisory: + gem: rubyzip + cve: 2019-16892 + ghsa: 5m2v-hc64-56h6 + url: https://github.com/rubyzip/rubyzip/pull/403 + title: Denial of Service in rubyzip ("zip bombs") + date: 2019-09-12 + description: | + In Rubyzip before 1.3.0, a crafted ZIP file can bypass application + checks on ZIP entry sizes because data about the uncompressed size + can be spoofed. This allows attackers to cause a denial of service + (disk consumption). + cvss_v3: 5.5 + patched_versions: + - ">= 1.3.0" +--- diff --git a/advisories/_posts/2019-09-23-CVE-2019-16145.md b/advisories/_posts/2019-09-23-CVE-2019-16145.md new file mode 100644 index 00000000..4527ae73 --- /dev/null +++ b/advisories/_posts/2019-09-23-CVE-2019-16145.md @@ -0,0 +1,19 @@ +--- +layout: advisory +title: 'CVE-2019-16145 (padrino-contrib): padrino-contrib XSS via caption parameter + of breadcrumbs helper' +comments: false +categories: +- padrino-contrib +advisory: + gem: padrino-contrib + cve: 2019-16145 + ghsa: rwpr-83g3-96g7 + url: https://github.com/padrino/padrino-contrib/pull/35 + date: 2019-09-23 + title: padrino-contrib XSS via caption parameter of breadcrumbs helper + description: | + The breadcrumbs contributed module through 0.2.0 for Padrino Framework + allows XSS via a caption. + cvss_v3: 6.1 +--- diff --git a/advisories/_posts/2019-09-23-CVE-2019-16377.md b/advisories/_posts/2019-09-23-CVE-2019-16377.md new file mode 100644 index 00000000..b2624af4 --- /dev/null +++ b/advisories/_posts/2019-09-23-CVE-2019-16377.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2019-16377 (consul): Consul gem insufficient authentication check - Multiple + powers in one controller are not always checked correctly' +comments: false +categories: +- consul +advisory: + gem: consul + cve: 2019-16377 + ghsa: 8jhx-9gf4-hhf5 + url: https://github.com/makandra/consul/issues/49 + title: Consul gem insufficient authentication check - Multiple powers in one controller + are not always checked correctly + date: 2019-09-23 + description: | + With the consul ruby gem before 1.0.3, if a controller checks multiple powers + using `:if` or `:except` conditions, these conditions are erroneously applied + to all power checks in that controller. This can lead to skipped power checks + and hence unauthenticated access to certain controller actions. + cvss_v3: 9.8 + patched_versions: + - ">= 1.0.3" +--- diff --git a/advisories/_posts/2019-09-27-CVE-2019-16676.md b/advisories/_posts/2019-09-27-CVE-2019-16676.md new file mode 100644 index 00000000..7bb17df2 --- /dev/null +++ b/advisories/_posts/2019-09-27-CVE-2019-16676.md @@ -0,0 +1,24 @@ +--- +layout: advisory +title: 'CVE-2019-16676 (simple_form): simple_form Gem for Ruby Incorrect Access Control + for forms based on user input' +comments: false +categories: +- simple_form +advisory: + gem: simple_form + cve: 2019-16676 + ghsa: r74q-gxcg-73hx + url: https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx + title: simple_form Gem for Ruby Incorrect Access Control for forms based on user + input + date: 2019-09-27 + description: | + Simple Form before 5.0 has Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`, + because a user-supplied string is invoked as a method call. + + This only happens for pages that build forms based on user input. + cvss_v3: 9.8 + patched_versions: + - ">= 5.0" +--- diff --git a/advisories/_posts/2019-10-07-CVE-2024-22050.md b/advisories/_posts/2019-10-07-CVE-2024-22050.md new file mode 100644 index 00000000..851e24db --- /dev/null +++ b/advisories/_posts/2019-10-07-CVE-2024-22050.md @@ -0,0 +1,53 @@ +--- +layout: advisory +title: 'CVE-2024-22050 (iodine): Malicious URL drafting attack against iodines static + file server may allow path traversal' +comments: false +categories: +- iodine +advisory: + gem: iodine + cve: 2024-22050 + ghsa: 85rf-xh54-whp3 + url: https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3 + title: Malicious URL drafting attack against iodines static file server may allow + path traversal + date: 2019-10-07 + description: |2 + + ### Impact + + A path traversal vulnerability was detected in iodine's static + file service. This vulnerability effects any application running + iodine's static file server on an effected iodine version. + + Malicious URL drafting may cause the static file server to attempt + a response containing data from files that shouldn't be normally + accessible from the public folder. + + ### Patches + + The vulnerability was patched in version 0.7.34. Please upgrade + to the latest version. + + ### Workarounds + + A possible workaround would be to disable the static file service + and it's `X-Sendfile` support, sending static files using nginx + or a source code solution (sending the data dynamically). + + However, it would be better to upgrade iodine to the latest + version, as it also contains non-security related fixes. + + ### For more information + If you have any questions or comments about this advisory: + * Email [Boaz Segev](https://github.com/boazsegev) + patched_versions: + - ">= 0.7.34" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2024-22050 + - https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3 + - https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889 + - https://github.com/advisories/GHSA-85rf-xh54-whp3 +--- diff --git a/advisories/_posts/2019-10-07-GHSA-85rf-xh54-whp3.md b/advisories/_posts/2019-10-07-GHSA-85rf-xh54-whp3.md new file mode 100644 index 00000000..d5761168 --- /dev/null +++ b/advisories/_posts/2019-10-07-GHSA-85rf-xh54-whp3.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'GHSA-85rf-xh54-whp3 (iodine): iodine path traversal via malicious URL drafting + attack' +comments: false +categories: +- iodine +advisory: + gem: iodine + ghsa: 85rf-xh54-whp3 + url: https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3 + date: 2019-10-07 + title: iodine path traversal via malicious URL drafting attack + description: | + Malicious URL drafting attack against iodines static file server + may allow path traversal + + Impact: + A path traversal vulnerability was detected in iodine's static file service. + + This vulnerability effects any application running iodine's static file server + on an effected iodine version. + + Malicious URL drafting may cause the static file server to attempt a response + containing data from files that shouldn't be normally accessible from the + public folder. + patched_versions: + - ">= 0.7.34" +--- diff --git a/advisories/_posts/2019-10-14-CVE-2019-17383.md b/advisories/_posts/2019-10-14-CVE-2019-17383.md new file mode 100644 index 00000000..3012cc9f --- /dev/null +++ b/advisories/_posts/2019-10-14-CVE-2019-17383.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-17383 (netaddr): netaddr world-writeable file permissions' +comments: false +categories: +- netaddr +advisory: + gem: netaddr + cve: 2019-17383 + ghsa: 49pj-69vf-c689 + url: https://github.com/dspinhirne/netaddr-rb/pull/20 + date: 2019-10-14 + title: netaddr world-writeable file permissions + description: | + The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, + such that a gem install may result in 0777 permissions in the target filesystem. + cvss_v3: 9.8 + patched_versions: + - "~> 1.5.3" + - ">= 2.0.4" +--- diff --git a/advisories/_posts/2019-10-22-CVE-2019-15587.md b/advisories/_posts/2019-10-22-CVE-2019-15587.md new file mode 100644 index 00000000..5f6bec99 --- /dev/null +++ b/advisories/_posts/2019-10-22-CVE-2019-15587.md @@ -0,0 +1,20 @@ +--- +layout: advisory +title: 'CVE-2019-15587 (loofah): Loofah XSS Vulnerability' +comments: false +categories: +- loofah +advisory: + gem: loofah + cve: 2019-15587 + ghsa: c3gv-9cxf-6f57 + url: https://github.com/flavorjones/loofah/issues/171 + title: Loofah XSS Vulnerability + date: 2019-10-22 + description: | + In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in + sanitized output when a crafted SVG element is republished. + cvss_v3: 6.4 + patched_versions: + - ">= 2.3.1" +--- diff --git a/advisories/_posts/2019-10-24-CVE-2019-18409.md b/advisories/_posts/2019-10-24-CVE-2019-18409.md new file mode 100644 index 00000000..6f3ff171 --- /dev/null +++ b/advisories/_posts/2019-10-24-CVE-2019-18409.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2019-18409 (ruby_parser-legacy): ruby_parser-legacy world writable files + allow local privilege escalation' +comments: false +categories: +- ruby_parser-legacy +advisory: + gem: ruby_parser-legacy + cve: 2019-18409 + ghsa: hhwc-8g49-j8jx + url: https://github.com/zenspider/ruby_parser-legacy/issues/1 + title: ruby_parser-legacy world writable files allow local privilege escalation + date: 2019-10-24 + description: | + The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local + privilege escalation because of world-writable files. For example, + if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, + a local user can insert malicious code into the + ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file. + cvss_v2: 4.6 + cvss_v3: 7.8 +--- diff --git a/advisories/_posts/2019-10-31-CVE-2019-13117.md b/advisories/_posts/2019-10-31-CVE-2019-13117.md new file mode 100644 index 00000000..8100513a --- /dev/null +++ b/advisories/_posts/2019-10-31-CVE-2019-13117.md @@ -0,0 +1,87 @@ +--- +layout: advisory +title: 'CVE-2019-13117 (nokogiri): Nokogiri gem, via libxslt, is affected by multiple + vulnerabilities' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2019-13117 + ghsa: 4hm9-844j-jmxp + url: https://github.com/sparklemotion/nokogiri/issues/1943 + title: Nokogiri gem, via libxslt, is affected by multiple vulnerabilities + date: 2019-10-31 + description: | + Nokogiri v1.10.5 has been released. + + This is a security release. It addresses three CVEs in upstream libxml2, + for which details are below. + + If you're using your distro's system libraries, rather than Nokogiri's + vendored libraries, there's no security need to upgrade at this time, + though you may want to check with your distro whether they've patched this + (Canonical has patched Ubuntu packages). Note that libxslt 1.1.34 addresses + these vulnerabilities. + + Full details about the security update are available in Github Issue + [#1943] https://github.com/sparklemotion/nokogiri/issues/1943. + + --- + + CVE-2019-13117 + + https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13117.html + + Priority: Low + + Description: In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings + could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This + could allow an attacker to discern whether a byte on the stack contains the + characters A, a, I, i, or 0, or any other character. + + Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1 + + --- + + CVE-2019-13118 + + https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13118.html + + Priority: Low + + Description: In numbers.c in libxslt 1.1.33, a type holding grouping characters of an + xsl:number instruction was too narrow and an invalid character/length + combination could be passed to xsltNumberFormatDecimal, leading to a read + of uninitialized stack data + + Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b + + --- + + CVE-2019-18197 + + https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18197.html + + Priority: Medium + + Description: In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't + reset under certain circumstances. If the relevant memory area happened to + be freed and reused in a certain way, a bounds check could fail and memory + outside a buffer could be written to, or uninitialized data could be + disclosed. + + Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285 + patched_versions: + - ">= 1.10.5" + related: + cve: + - 2019-13118 + - 2019-18197 + url: + - https://groups.google.com/d/msg/ruby-security-ann/-Wq4aouIA3Q/yc76ZHemBgAJ + - https://usn.ubuntu.com/4164-1/ + - https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1 + - https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b + - https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285 +--- diff --git a/advisories/_posts/2019-11-09-CVE-2019-18841.md b/advisories/_posts/2019-11-09-CVE-2019-18841.md new file mode 100644 index 00000000..f5adc85b --- /dev/null +++ b/advisories/_posts/2019-11-09-CVE-2019-18841.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2019-18841 (chartkick): Prototype Pollution in Chartkick.js 3.1.x' +comments: false +categories: +- chartkick +advisory: + gem: chartkick + cve: 2019-18841 + ghsa: 5pm8-492c-92p5 + url: https://github.com/ankane/chartkick.js/issues/117 + title: Prototype Pollution in Chartkick.js 3.1.x + date: 2019-11-09 + description: | + A specially crafted response in data loaded via URL + can cause prototype pollution in JavaScript. + cvss_v3: 7.3 + unaffected_versions: + - "< 3.1.0" + patched_versions: + - ">= 3.3.0" +--- diff --git a/advisories/_posts/2019-11-14-CVE-2019-18848.md b/advisories/_posts/2019-11-14-CVE-2019-18848.md new file mode 100644 index 00000000..c9a2d0d2 --- /dev/null +++ b/advisories/_posts/2019-11-14-CVE-2019-18848.md @@ -0,0 +1,22 @@ +--- +layout: advisory +title: 'CVE-2019-18848 (json-jwt): json-jwt improper input validation due to lack + of element count when splitting string' +comments: false +categories: +- json-jwt +advisory: + gem: json-jwt + cve: 2019-18848 + ghsa: cff7-6h4q-q5pj + url: https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a + date: 2019-11-14 + title: json-jwt improper input validation due to lack of element count when splitting + string + description: | + The json-jwt gem before 1.11.0 for Ruby lacks an element count during + the splitting of a JWE string. + cvss_v3: 7.5 + patched_versions: + - ">= 1.11.0" +--- diff --git a/advisories/_posts/2019-11-15-CVE-2019-18978.md b/advisories/_posts/2019-11-15-CVE-2019-18978.md new file mode 100644 index 00000000..05a974d4 --- /dev/null +++ b/advisories/_posts/2019-11-15-CVE-2019-18978.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-18978 (rack-cors): rack-cors directory traversal via path' +comments: false +categories: +- rack-cors +advisory: + gem: rack-cors + cve: 2019-18978 + ghsa: pf8f-w267-mq2h + url: https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d + title: rack-cors directory traversal via path + date: 2019-11-15 + description: | + An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem + before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources + because resource matching does not ensure that pathnames are in a canonical format. + cvss_v3: 5.3 + patched_versions: + - ">= 1.0.4" +--- diff --git a/advisories/_posts/2019-12-05-CVE-2019-16770.md b/advisories/_posts/2019-12-05-CVE-2019-16770.md new file mode 100644 index 00000000..fdcb9603 --- /dev/null +++ b/advisories/_posts/2019-12-05-CVE-2019-16770.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2019-16770 (puma): Keepalive thread overload/DoS in puma' +comments: false +categories: +- puma +advisory: + gem: puma + cve: 2019-16770 + ghsa: 7xx3-m584-x994 + url: https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994 + date: 2019-12-05 + title: Keepalive thread overload/DoS in puma + description: | + A poorly-behaved client could use keepalive requests to monopolize + Puma's reactor and create a denial of service attack. + + If more keepalive connections to Puma are opened than there are + threads available, additional connections will wait permanently if + the attacker sends requests frequently enough. + cvss_v3: 8.8 + cvss_v2: 6.8 + patched_versions: + - "~> 3.12.2" + - ">= 4.3.1" +--- diff --git a/advisories/_posts/2019-12-16-CVE-2019-16779.md b/advisories/_posts/2019-12-16-CVE-2019-16779.md new file mode 100644 index 00000000..839f1e91 --- /dev/null +++ b/advisories/_posts/2019-12-16-CVE-2019-16779.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2019-16779 (excon): Race condition when using persistent connections' +comments: false +categories: +- excon +advisory: + gem: excon + cve: 2019-16779 + ghsa: q58g-455p-8vw9 + url: https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9 + date: 2019-12-16 + title: Race condition when using persistent connections + description: | + There was a race condition around persistent connections, where a connection + which is interrupted (such as by a timeout) would leave data on the socket. + Subsequent requests would then read this data, returning content from the + previous response. The race condition window appears to be short, and it + would be difficult to purposefully exploit this. + + Users can workaround the problem by disabling persistent connections, though + this may cause performance implications. + cvss_v3: 5.8 + patched_versions: + - ">= 0.71.0" + related: + url: + - https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29 +--- diff --git a/advisories/_posts/2019-12-18-CVE-2019-16782.md b/advisories/_posts/2019-12-18-CVE-2019-16782.md new file mode 100644 index 00000000..23d639d4 --- /dev/null +++ b/advisories/_posts/2019-12-18-CVE-2019-16782.md @@ -0,0 +1,39 @@ +--- +layout: advisory +title: 'CVE-2019-16782 (rack): Possible information leak / session hijack vulnerability' +comments: false +categories: +- rack +advisory: + gem: rack + cve: 2019-16782 + ghsa: hrqr-hxpp-chr3 + url: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3 + date: 2019-12-18 + title: Possible information leak / session hijack vulnerability + description: | + There's a possible information leak / session hijack vulnerability in Rack. + + Attackers may be able to find and hijack sessions by using timing attacks + targeting the session id. Session ids are usually stored and indexed in a + database that uses some kind of scheme for speeding up lookups of that + session id. By carefully measuring the amount of time it takes to look up + a session, an attacker may be able to find a valid session id and hijack + the session. + + The session id itself may be generated randomly, but the way the session is + indexed by the backing store does not use a secure comparison. + + Impact: + + The session id stored in a cookie is the same id that is used when querying + the backing session storage engine. Most storage mechanisms (for example a + database) use some sort of indexing in order to speed up the lookup of that + id. By carefully timing requests and session lookup failures, an attacker + may be able to perform a timing attack to determine an existing session id + and hijack that session. + cvss_v3: 6.3 + patched_versions: + - "~> 1.6.12" + - ">= 2.0.8" +--- diff --git a/advisories/_posts/2019-12-26-CVE-2019-19919.md b/advisories/_posts/2019-12-26-CVE-2019-19919.md new file mode 100644 index 00000000..81b105dd --- /dev/null +++ b/advisories/_posts/2019-12-26-CVE-2019-19919.md @@ -0,0 +1,28 @@ +--- +layout: advisory +title: 'CVE-2019-19919 (bootstrap-wysihtml5-rails): Prototype Pollution in handlebars' +comments: false +categories: +- bootstrap-wysihtml5-rails +advisory: + gem: bootstrap-wysihtml5-rails + cve: 2019-19919 + ghsa: w457-6q6x-cgp9 + url: https://github.com/advisories/GHSA-w457-6q6x-cgp9 + title: Prototype Pollution in handlebars + date: 2019-12-26 + description: | + The bootstrap-wysihtml5-rails gem includes the vendored JavaScript library 'handlebars.js'. + Versions 0.3.3.7-0.3.3.8 include handlebars 3.0.2, and versions 0.3.3.5-0.3.3.6 include handlebars 1.3.0. + + Versions Affected: 0.3.3.5-0.3.3.8 + Not affected: < 0.3.3.5 + Fixed Versions: None + + Versions of handlebars prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. + Templates may alter an Objects' __proto__ and __defineGetter__ properties, which may allow an attacker to execute + arbitrary code through crafted payloads. + cvss_v3: 9.8 + unaffected_versions: + - "< 0.3.3.5" +--- diff --git a/advisories/_posts/2020-01-09-CVE-2014-3211.md b/advisories/_posts/2020-01-09-CVE-2014-3211.md new file mode 100644 index 00000000..b384ab5f --- /dev/null +++ b/advisories/_posts/2020-01-09-CVE-2014-3211.md @@ -0,0 +1,33 @@ +--- +layout: advisory +title: 'CVE-2014-3211 (publify_core): Publify vulnerable to DoS attack' +comments: false +categories: +- publify_core +advisory: + gem: publify_core + cve: 2014-3211 + ghsa: vq74-9583-hrm4 + url: https://github.com/publify/publify/releases/tag/v8.0.2 + title: Publify vulnerable to DoS attack + date: 2020-01-09 + description: 'Publify before 8.0.2 is vulnerable to a Denial of Service attack + + ' + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 8.0.2" + related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2014-3211 + - https://cve.report/CVE-2014-3211 + - https://github.com/publify/publify/releases/tag/v8.0.2 + - https://publify.github.io + - https://rubygems.org/gems/publify_core + - https://rubygems.org/gems/typo + - https://github.com/advisories/GHSA-vq74-9583-hrm4 + notes: | + Found "Formerly known as Typo" at https://github.com/publify/publify + FYI: Gem publify_core oldest release is 9.0.0.pre1 (11/13/2016); +--- diff --git a/advisories/_posts/2020-01-23-CVE-2020-5216.md b/advisories/_posts/2020-01-23-CVE-2020-5216.md new file mode 100644 index 00000000..21bd5c03 --- /dev/null +++ b/advisories/_posts/2020-01-23-CVE-2020-5216.md @@ -0,0 +1,57 @@ +--- +layout: advisory +title: 'CVE-2020-5216 (secure_headers): secure_headers header injection due to newline' +comments: false +categories: +- secure_headers +advisory: + gem: secure_headers + cve: 2020-5216 + ghsa: w978-rmpf-qmwg + url: https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg + date: 2020-01-23 + title: secure_headers header injection due to newline + description: | + If user-supplied input was passed into append/override_content_security_policy_directives, + a newline could be injected leading to limited header injection. + + Upon seeing a newline in the header, rails will silently create a new Content-Security-Policy + header with the remaining value of the original string. It will continue to create new headers + for each newline. + + e.g. + + ``` + override_content_security_directives(script_src: ['mycdn.com', "\ninjected\n"]) + ``` + + would result in + + ``` + Content-Security-Policy: ... script-src: mycdn.com + Content-Security-Policy: injected + Content-Security-Policy: rest-of-the-header + ``` + + CSP supports multiple headers and all policies must be satisfied for execution to occur, but a malicious value that reports the current page is fairly trivial: + + ``` + override_content_security_directives(script_src: ["mycdn.com", "\ndefault-src 'none'; report-uri evil.com"]) + ``` + + ``` + Content-Security-Policy: ... script-src: mycdn.com + Content-Security-Policy: default-src 'none'; report-uri evil.com + Content-Security-Policy: rest-of-the-header + ``` + + Workarounds + ``` + override_content_security_policy_directives(:frame_src, [user_input.gsub("\n", " ")]) + ``` + cvss_v3: 4.4 + patched_versions: + - "~> 3.9" + - "~> 5.2" + - ">= 6.3.0" +--- diff --git a/advisories/_posts/2020-01-23-CVE-2020-5217.md b/advisories/_posts/2020-01-23-CVE-2020-5217.md new file mode 100644 index 00000000..c11742bc --- /dev/null +++ b/advisories/_posts/2020-01-23-CVE-2020-5217.md @@ -0,0 +1,47 @@ +--- +layout: advisory +title: 'CVE-2020-5217 (secure_headers): secure_headers directive injection using semicolon' +comments: false +categories: +- secure_headers +advisory: + gem: secure_headers + cve: 2020-5217 + ghsa: xq52-rv6w-397c + url: https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c + date: 2020-01-23 + title: secure_headers directive injection using semicolon + description: | + If user-supplied input was passed into append/override_content_security_policy_directives, + a semicolon could be injected leading to directive injection. + + This could be used to e.g. override a script-src directive. Duplicate directives are ignored + and the first one wins. The directives in secure_headers are sorted alphabetically so they + pretty much all come before script-src. A previously undefined directive would receive a value + even if SecureHeaders::OPT_OUT was supplied. + + The fixed versions will silently convert the semicolons to spaces and emit a deprecation warning + when this happens. This will result in innocuous browser console messages if being + exploited/accidentally used. In future releases, we will raise application errors resulting in + 500s. + + > Duplicate script-src directives detected. All but the first instance will be ignored. + + See https://www.w3.org/TR/CSP3/#parse-serialized-policy + + > Note: In this case, the user agent SHOULD notify developers that a duplicate directive was + > ignored. A console warning might be appropriate, for example. + + # Workarounds + + If you are passing user input into the above methods, you could filter out the input: + + ``` + override_content_security_policy_directives(:frame_src, [user_input.gsub(";", " ")]) + ``` + cvss_v3: 4.4 + patched_versions: + - "~> 3.8" + - "~> 5.1" + - ">= 6.2.0" +--- diff --git a/advisories/_posts/2020-01-25-CVE-2020-7981.md b/advisories/_posts/2020-01-25-CVE-2020-7981.md new file mode 100644 index 00000000..72cf627c --- /dev/null +++ b/advisories/_posts/2020-01-25-CVE-2020-7981.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2020-7981 (geocoder): Geocoder gem for Ruby contains possible SQL injection + vulnerability' +comments: false +categories: +- geocoder +advisory: + gem: geocoder + cve: 2020-7981 + ghsa: 864j-6qpp-cmrr + url: https://github.com/alexreisner/geocoder/blob/master/CHANGELOG.md#161-2020-jan-23 + title: Geocoder gem for Ruby contains possible SQL injection vulnerability + date: 2020-01-25 + description: | + sql.rb in Geocoder allows Boolean-based SQL injection when within_bounding_box + is used in conjunction with untrusted sw_lat, sw_lng, ne_lat, or ne_lng data. + cvss_v2: 7.5 + cvss_v3: 9.8 + patched_versions: + - ">= 1.6.1" + related: + url: + - https://github.com/alexreisner/geocoder/compare/v1.6.0...v1.6.1 + - https://github.com/alexreisner/geocoder/commit/dcdc3d8675411edce3965941a2ca7c441ca48613 +--- diff --git a/advisories/_posts/2020-02-10-CVE-2020-5241.md b/advisories/_posts/2020-02-10-CVE-2020-5241.md new file mode 100644 index 00000000..7aeefd96 --- /dev/null +++ b/advisories/_posts/2020-02-10-CVE-2020-5241.md @@ -0,0 +1,23 @@ +--- +layout: advisory +title: 'CVE-2020-5241 (matestack-ui-core): matestack-ui-core is vulnerable to XSS/Script + injection' +comments: false +categories: +- matestack-ui-core +advisory: + gem: matestack-ui-core + cve: 2020-5241 + ghsa: 3jqw-vv45-mjhh + url: https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh + title: matestack-ui-core is vulnerable to XSS/Script injection + date: 2020-02-10 + description: | + matestack-ui-core does not excape strings by default and does not cover this in the docs. + matestack-ui-core should escape strings by default in order to prevent XSS/Script injection vulnerability. + v0.7.4 fixes that by escaping strings by default. + cvss_v2: 10.0 + cvss_v3: 9.8 + patched_versions: + - ">= 0.7.4" +--- diff --git a/advisories/_posts/2020-02-12-CVE-2020-7595.md b/advisories/_posts/2020-02-12-CVE-2020-7595.md new file mode 100644 index 00000000..56058022 --- /dev/null +++ b/advisories/_posts/2020-02-12-CVE-2020-7595.md @@ -0,0 +1,26 @@ +--- +layout: advisory +title: 'CVE-2020-7595 (nokogiri): libxml2 2.9.10 has an infinite loop in a certain + end-of-file situation' +comments: false +categories: +- nokogiri +advisory: + gem: nokogiri + cve: 2020-7595 + ghsa: 7553-jr98-vx47 + url: https://github.com/sparklemotion/nokogiri/issues/1992 + title: libxml2 2.9.10 has an infinite loop in a certain end-of-file situation + date: 2020-02-12 + description: |2 + + Nokogiri has backported the patch for CVE-2020-7595 into its vendored version + of libxml2, and released this as v1.10.8 + + CVE-2020-7595 has not yet been addressed in an upstream libxml2 release, and + so Nokogiri versions <= v1.10.7 are vulnerable. + cvss_v2: 5.0 + cvss_v3: 7.5 + patched_versions: + - ">= 1.10.8" +--- diff --git a/advisories/_posts/2020-02-14-CVE-2019-10780.md b/advisories/_posts/2020-02-14-CVE-2019-10780.md new file mode 100644 index 00000000..9ac2e600 --- /dev/null +++ b/advisories/_posts/2020-02-14-CVE-2019-10780.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2019-10780 (bibtex-ruby): OS command injection in BibTeX-Ruby' +comments: false +categories: +- bibtex-ruby +advisory: + gem: bibtex-ruby + cve: 2019-10780 + ghsa: c5r5-7pfh-6qg6 + url: https://github.com/advisories/GHSA-c5r5-7pfh-6qg6 + date: 2020-02-14 + title: OS command injection in BibTeX-Ruby + description: | + BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized + user input being passed directly to the built-in Ruby Kernel.open method through + BibTeX.open. + cvss_v3: 9.8 + patched_versions: + - ">= 5.1.0" +--- diff --git a/advisories/_posts/2020-02-27-CVE-2020-5247.md b/advisories/_posts/2020-02-27-CVE-2020-5247.md new file mode 100644 index 00000000..ba57df14 --- /dev/null +++ b/advisories/_posts/2020-02-27-CVE-2020-5247.md @@ -0,0 +1,29 @@ +--- +layout: advisory +title: 'CVE-2020-5247 (puma): HTTP Response Splitting vulnerability in puma' +comments: false +categories: +- puma +advisory: + gem: puma + cve: 2020-5247 + ghsa: 84j7-475p-hp8v + url: https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v + date: 2020-02-27 + title: HTTP Response Splitting vulnerability in puma + description: | + If an application using Puma allows untrusted input in a response header, + an attacker can use newline characters (i.e. CR, LF) to end the header and + inject malicious content, such as additional headers or an entirely new + response body. This vulnerability is known as HTTP Response Splitting. + + While not an attack in itself, response splitting is a vector for several + other attacks, such as cross-site scripting (XSS). + cvss_v3: 6.5 + patched_versions: + - "~> 3.12.4" + - ">= 4.3.3" + related: + cve: + - 2019-16254 +--- diff --git a/advisories/_posts/2020-03-03-CVE-2020-5249.md b/advisories/_posts/2020-03-03-CVE-2020-5249.md new file mode 100644 index 00000000..d31f91f9 --- /dev/null +++ b/advisories/_posts/2020-03-03-CVE-2020-5249.md @@ -0,0 +1,40 @@ +--- +layout: advisory +title: 'CVE-2020-5249 (puma): HTTP Response Splitting (Early Hints) in Puma' +comments: false +categories: +- puma +advisory: + gem: puma + cve: 2020-5249 + ghsa: 33vf-4xgg-9r58 + url: https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58 + date: 2020-03-03 + title: HTTP Response Splitting (Early Hints) in Puma + description: | + ### Impact + If an application using Puma allows untrusted input in an early-hints header, + an attacker can use a carriage return character to end the header and inject + malicious content, such as additional headers or an entirely new response body. + This vulnerability is known as [HTTP Response + Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting) + + While not an attack in itself, response splitting is a vector for several other + attacks, such as cross-site scripting (XSS). + + This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), + which fixed this vulnerability but only for regular responses. + + ### Patches + This has been fixed in 4.3.3 and 3.12.4. + + ### Workarounds + Users can not allow untrusted/user input in the Early Hints response header. + cvss_v3: 6.5 + patched_versions: + - "~> 3.12.4" + - ">= 4.3.3" + related: + cve: + - 2020-5247 +--- diff --git a/advisories/_posts/2020-03-10-CVE-2020-5243.md b/advisories/_posts/2020-03-10-CVE-2020-5243.md new file mode 100644 index 00000000..a6989346 --- /dev/null +++ b/advisories/_posts/2020-03-10-CVE-2020-5243.md @@ -0,0 +1,37 @@ +--- +layout: advisory +title: 'CVE-2020-5243 (user_agent_parser): Denial of Service in uap-core when processing + crafted User-Agent strings' +comments: false +categories: +- user_agent_parser +advisory: + gem: user_agent_parser + cve: 2020-5243 + ghsa: pcqq-5962-hvcw + url: https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw + date: 2020-03-10 + title: Denial of Service in uap-core when processing crafted User-Agent strings + description: | + ### Impact + Some regexes are vulnerable to regular expression denial of service (REDoS) due to + overlapping capture groups. This allows remote attackers to overload a server by + setting the User-Agent header in an HTTP(S) request to maliciously crafted long + strings. + + ### Patches + Please update `uap-ruby` to >= v2.6.0 + + ### For more information + https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p + cvss_v3: 5.7 + patched_versions: + - ">= 2.6.0" + related: + ghsa: + - cmcx-xhr8-3w9p + url: + - https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw + - https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a + - https://github.com/advisories/GHSA-pcqq-5962-hvcw +--- diff --git a/advisories/_posts/2020-03-10-GHSA-pcqq-5962-hvcw.md b/advisories/_posts/2020-03-10-GHSA-pcqq-5962-hvcw.md new file mode 100644 index 00000000..042ae100 --- /dev/null +++ b/advisories/_posts/2020-03-10-GHSA-pcqq-5962-hvcw.md @@ -0,0 +1,32 @@ +--- +layout: advisory +title: 'GHSA-pcqq-5962-hvcw (user_agent_parser): Denial of Service in uap-core when + processing crafted User-Agent strings' +comments: false +categories: +- user_agent_parser +advisory: + gem: user_agent_parser + ghsa: pcqq-5962-hvcw + url: https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw + title: Denial of Service in uap-core when processing crafted User-Agent strings + date: 2020-03-10 + description: |- + ### Impact + Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. + + ### Patches + Please update `uap-ruby` to >= v2.6.0 + + ### For more information + https://github.com/ua-parser/uap-core/security/advisories/GHSA-cmcx-xhr8-3w9p + + Reported in `uap-core` by Ben Caller @bcaller + patched_versions: + - ">= 2.6.0" + related: + url: + - https://github.com/ua-parser/uap-ruby/security/advisories/GHSA-pcqq-5962-hvcw + - https://github.com/ua-parser/uap-ruby/commit/2bb18268f4c5ba7d4ba0e21c296bf6437063da3a + - https://github.com/advisories/GHSA-pcqq-5962-hvcw +--- diff --git a/advisories/_posts/2020-03-14-CVE-2020-36190.md b/advisories/_posts/2020-03-14-CVE-2020-36190.md new file mode 100644 index 00000000..fb8cb77a --- /dev/null +++ b/advisories/_posts/2020-03-14-CVE-2020-36190.md @@ -0,0 +1,21 @@ +--- +layout: advisory +title: 'CVE-2020-36190 (rails_admin): rails_admin ruby gem XSS vulnerability' +comments: false +categories: +- rails_admin +advisory: + gem: rails_admin + cve: 2020-36190 + ghsa: wjx2-7hqq-8h7m + url: https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375 + title: rails_admin ruby gem XSS vulnerability + date: 2020-03-14 + description: | + RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows + XSS via nested forms. + cvss_v3: 6.1 + patched_versions: + - "~> 1.4.3" + - ">= 2.0.2" +--- diff --git a/advisories/_posts/2020-03-14-CVE-2020-5257.md b/advisories/_posts/2020-03-14-CVE-2020-5257.md new file mode 100644 index 00000000..e8d75270 --- /dev/null +++ b/advisories/_posts/2020-03-14-CVE-2020-5257.md @@ -0,0 +1,31 @@ +--- +layout: advisory +title: 'CVE-2020-5257 (administrate): Sort order SQL injection via `direction` parameter + in administrate' +comments: false +categories: +- administrate +advisory: + gem: administrate + cve: 2020-5257 + ghsa: 2p5p-m353-833w + title: Sort order SQL injection via `direction` parameter in administrate + date: 2020-03-14 + url: https://github.com/advisories/GHSA-2p5p-m353-833w + description: | + In Administrate (rubygem) before version 0.13.0, when sorting by attributes + on a dashboard, the direction parameter was not validated before being + interpolated into the SQL query. + + This could present a SQL injection if the attacker were able to modify the + direction parameter and bypass ActiveRecord SQL protections. + + Whilst this does have a high-impact, to exploit this you need access to the + Administrate dashboards, which should generally be behind authentication. + cvss_v3: 7.7 + patched_versions: + - ">= 0.13.0" + related: + url: + - https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3 +--- diff --git a/advisories/_posts/2020-03-19-CVE-2020-10663.md b/advisories/_posts/2020-03-19-CVE-2020-10663.md new file mode 100644 index 00000000..a3bc0ebc --- /dev/null +++ b/advisories/_posts/2020-03-19-CVE-2020-10663.md @@ -0,0 +1,43 @@ +--- +layout: advisory +title: 'CVE-2020-10663 (json): json Gem for Ruby Unsafe Object Creation Vulnerability + (additional fix)' +comments: false +categories: +- json +advisory: + gem: json + cve: 2020-10663 + ghsa: jphg-qwrw-7w9g + url: https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/ + title: json Gem for Ruby Unsafe Object Creation Vulnerability (additional fix) + date: 2020-03-19 + description: | + There is an unsafe object creation vulnerability in the json gem bundled with + Ruby. This vulnerability has been assigned the CVE identifier CVE-2020-10663. + We strongly recommend upgrading the json gem. + + Details + ------- + + When parsing certain JSON documents, the json gem (including the one bundled + with Ruby) can be coerced into creating arbitrary objects in the target system. + + This is the same issue as CVE-2013-0269. The previous fix was incomplete, which + addressed JSON.parse(user_input), but didn’t address some other styles of JSON + parsing including JSON(user_input) and JSON.parse(user_input, nil). + + See CVE-2013-0269 in detail. Note that the issue was exploitable to cause a + Denial of Service by creating many garbage-uncollectable Symbol objects, but + this kind of attack is no longer valid because Symbol objects are now + garbage-collectable. However, creating arbitrary objects may cause severe + security consequences depending upon the application code. + cvss_v3: 7.5 + patched_versions: + - ">= 2.3.0" + related: + cve: + - 2013-0269 + url: + - https://groups.google.com/forum/#!topic/ruby-security-ann/ermX1eQqqKA +--- diff --git a/advisories/_posts/2020-03-19-CVE-2020-5267.md b/advisories/_posts/2020-03-19-CVE-2020-5267.md new file mode 100644 index 00000000..816adc71 --- /dev/null +++ b/advisories/_posts/2020-03-19-CVE-2020-5267.md @@ -0,0 +1,78 @@ +--- +layout: advisory +title: 'CVE-2020-5267 (actionview): Possible XSS vulnerability in ActionView' +comments: false +categories: +- actionview +- rails +advisory: + gem: actionview + framework: rails + cve: 2020-5267 + ghsa: 65cv-r6x7-79hv + url: https://groups.google.com/forum/#!topic/rubyonrails-security/55reWMM_Pg8 + title: Possible XSS vulnerability in ActionView + date: 2020-03-19 + description: | + There is a possible XSS vulnerability in ActionView's JavaScript literal + escape helpers. Views that use the `j` or `escape_javascript` methods + may be susceptible to XSS attacks. + + Versions Affected: All. + Not affected: None. + Fixed Versions: 6.0.2.2, 5.2.4.2 + + Impact + ------ + There is a possible XSS vulnerability in the `j` and `escape_javascript` + methods in ActionView. These methods are used for escaping JavaScript string + literals. Impacted code will look something like this: + + ```erb + + ``` + + or + + ```erb + + ``` + + Releases + -------- + The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations. + + Workarounds + ----------- + For those that can't upgrade, the following monkey patch may be used: + + ```ruby + ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!( + { + "`" => "\\`", + "$" => "\\$" + } + ) + + module ActionView::Helpers::JavaScriptHelper + alias :old_ej :escape_javascript + alias :old_j :j + + def escape_javascript(javascript) + javascript = javascript.to_s + if javascript.empty? + result = "" + else + result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP) + end + javascript.html_safe? ? result.html_safe : result + end + + alias :j :escape_javascript + end + ``` + cvss_v3: 4.0 + patched_versions: + - "~> 5.2.4, >= 5.2.4.2" + - ">= 6.0.2.2" +--- diff --git a/advisories/_posts/2020-04-29-CVE-2015-4411.md b/advisories/_posts/2020-04-29-CVE-2015-4411.md new file mode 100644 index 00000000..fbafe775 --- /dev/null +++ b/advisories/_posts/2020-04-29-CVE-2015-4411.md @@ -0,0 +1,25 @@ +--- +layout: advisory +title: 'CVE-2015-4411 (bson): Potential denial of service in bson rubygem' +comments: false +categories: +- bson +advisory: + gem: bson + cve: 2015-4411 + ghsa: qh4w-7pw3-p4rp + url: https://github.com/advisories/GHSA-qh4w-7pw3-p4rp + date: 2020-04-29 + title: Potential denial of service in bson rubygem + description: | + The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 + as used in rubygem-moped allows remote attackers to cause a denial of service (worker + resource consumption) via a crafted string. NOTE: This issue is due to an incomplete + fix to CVE-2015-4410. + cvss_v3: 7.5 + patched_versions: + - ">= 3.0.4" + related: + cve: + - 2015-4410 +--- diff --git a/advisories/_posts/2020-04-29-CVE-2020-11020.md b/advisories/_posts/2020-04-29-CVE-2020-11020.md new file mode 100644 index 00000000..d4436969 --- /dev/null +++ b/advisories/_posts/2020-04-29-CVE-2020-11020.md @@ -0,0 +1,95 @@ +--- +layout: advisory +title: 'CVE-2020-11020 (faye): Authentication and extension bypass in Faye' +comments: false +categories: +- faye +advisory: + gem: faye + cve: 2020-11020 + ghsa: qpg4-4w7w-2mq5 + url: https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5 + date: 2020-04-29 + title: Authentication and extension bypass in Faye + description: | + On 20 April 2020 it was reported to me that the potential for authentication + bypass exists in [Faye][1]'s extension system. This vulnerability has existed in + the Node.js and Ruby versions of the server since version 0.5.0, when extensions + were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and + 1.2.5, which we are releasing today. + + The vulnerability allows any client to bypass checks put in place by server-side + extensions, by appending extra segments to the message channel. For example, the + Faye [extension docs][2] suggest that users implement access control for + subscriptions by checking incoming messages for the `/meta/subscribe` channel, + for example: + + ```js + server.addExtension({ + incoming: function(message, callback) { + if (message.channel === '/meta/subscribe') { + if (message.ext.authToken !== 'my super secret password') { + message.error = 'Invalid auth token'; + } + } + callback(message); + } + }); + ``` + + A bug in the server's code for recognising the special `/meta/*` channels, which + trigger connection and subscription events, means that a client can bypass this + check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`: + + ```json + { + "channel": "/meta/subscribe/x", + "clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3", + "subscription": "/foo" + } + ``` + + This message will not be checked by the above extension, as it checks the + message's channel is exactly equal to `/meta/subscribe`. But it will still be + processed as a subscription request by the server, so the client becomes + subscribed to the channel `/foo` without supplying the necessary credentials. + + The vulnerability is caused by the way the Faye server recognises meta channels. + It will treat a message to any channel that's a prefix-match for one of the + special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, + `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for + that channel. So, a message to `/meta/subscribe/x` is still processed as a + subscription request, for example. + + An authentication bypass for subscription requests is the most serious effect of + this but all other meta channels are susceptible to similar manipulation. + + This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. + These should be drop-in replacements for prior versions and you should upgrade + immediately if you are running any prior version. + + If you are unable to install one of these versions, you can make your extensions + catch all messages the server would process by checking the channel _begins_ + with the expected channel name, for example: + + ```js + server.addExtension({ + incoming: function(message, callback) { + if (message.channel.startsWith('/meta/subscribe')) { + // authentication logic + } + callback(message); + } + }); + ``` + + [1]: https://faye.jcoglan.com/ + [2]: https://faye.jcoglan.com/node/extensions.html + cvss_v3: 8.5 + patched_versions: + - "~> 1.0.4" + - "~> 1.1.3" + - ">= 1.2.5" + unaffected_versions: + - "< 0.5.0" +--- diff --git a/advisories/_posts/2020-04-29-CVE-2020-11022.md b/advisories/_posts/2020-04-29-CVE-2020-11022.md new file mode 100644 index 00000000..441da288 --- /dev/null +++ b/advisories/_posts/2020-04-29-CVE-2020-11022.md @@ -0,0 +1,99 @@ +--- +layout: advisory +title: 'CVE-2020-11022 (jquery-rails): Potential XSS vulnerability in jQuery' +comments: false +categories: +- jquery-rails +advisory: + gem: jquery-rails + cve: 2020-11022 + ghsa: gxr4-xjj5-5px2 + url: https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 + title: Potential XSS vulnerability in jQuery + date: 2020-04-29 + description: | + ### Impact + Passing HTML from untrusted sources - even after sanitizing it - to + one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, + and others) may execute untrusted code. + + ### Patches + This problem is patched in jQuery 3.5.0. + + ### Workarounds + To workaround the issue without upgrading, adding the following to + your code: + ```js + jQuery.htmlPrefilter = function( html ) { + return html; + }; + ``` + You need to use at least jQuery 1.12/2.2 or newer to be able to + apply this workaround. + + ### References + https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ + https://jquery.com/upgrade-guide/3.5/ + + ### For more information + If you have any questions or comments about this advisory, search + for a relevant issue in + [the jQuery repo](https://github.com/jquery/jquery/issues). + + If you don't find an answer, open a new issue." + cvss_v2: 4.3 + cvss_v3: 6.9 + unaffected_versions: + - "< 1.2.0" + patched_versions: + - ">= 3.5.0" + related: + url: + - https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2 + - https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77 + - https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ + - https://jquery.com/upgrade-guide/3.5/ + - https://nvd.nist.gov/vuln/detail/CVE-2020-11022 + - https://security.netapp.com/advisory/ntap-20200511-0006/ + - https://www.drupal.org/sa-core-2020-002 + - https://www.debian.org/security/2020/dsa-4693 + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOE7P7APPRQKD4FGNHBKJPDY6FFCOH3W/ + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/ + - https://www.oracle.com/security-alerts/cpujul2020.html + - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html + - https://security.gentoo.org/glsa/202007-03 + - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html + - https://lists.apache.org/thread.html/rdf44341677cf7eec7e9aa96dcf3f37ed709544863d619cca8c36f133@ + - https://github.com/advisories/GHSA-gxr4-xjj5-5px2 + - https://www.npmjs.com/advisories/1518 + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVKYXLWCLZBV2N7M46KYK4LVA5OXWPBY/ + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFP4UK4EGP4AFH2MWYJ5A5Z4I7XVFQ6B/ + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAPQVX3XDNPGFT26QAQ6AJIXZZBZ4CD4/ + - https://www.oracle.com/security-alerts/cpuoct2020.html + - https://lists.apache.org/thread.html/r706cfbc098420f7113968cc377247ec3d1439bce42e679c11c609e2d@ + - https://lists.apache.org/thread.html/rbb448222ba62c430e21e13f940be4cb5cfc373cd3bce56b48c0ffa67@ + - http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00039.html + - https://lists.apache.org/thread.html/r49ce4243b4738dd763caeb27fa8ad6afb426ae3e8c011ff00b8b1f48@ + - https://www.tenable.com/security/tns-2020-10 + - https://www.tenable.com/security/tns-2020-11 + - https://www.oracle.com/security-alerts/cpujan2021.html + - https://lists.apache.org/thread.html/r564585d97bc069137e64f521e68ba490c7c9c5b342df5d73c49a0760@ + - https://lists.apache.org/thread.html/r8f70b0f65d6bedf316ecd899371fd89e65333bc988f6326d2956735c@ + - https://www.tenable.com/security/tns-2021-02 + - https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html + - http://packetstormsecurity.com/files/162159/jQuery-1.2-Cross-Site-Scripting.html + - https://lists.apache.org/thread.html/rede9cfaa756e050a3d83045008f84a62802fc68c17f2b4eabeaae5e4@ + - https://lists.apache.org/thread.html/ree3bd8ddb23df5fa4e372d11c226830ea3650056b1059f3965b3fce2@ + - https://lists.apache.org/thread.html/r54565a8f025c7c4f305355fdfd75b68eca442eebdb5f31c2e7d977ae@ + - https://lists.apache.org/thread.html/re4ae96fa5c1a2fe71ccbb7b7ac1538bd0cb677be270a2bf6e2f8d108@ + - https://www.tenable.com/security/tns-2021-10 + - https://www.oracle.com/security-alerts/cpuApr2021.html + - https://www.oracle.com//security-alerts/cpujul2021.html + - https://www.oracle.com/security-alerts/cpuoct2021.html + - https://lists.apache.org/thread.html/r0483ba0072783c2e1bfea613984bfb3c86e73ba8879d780dc1cc7d36@ + - https://github.com/jquery/jquery/releases/tag/3.5.0 + - https://www.oracle.com/security-alerts/cpujan2022.html + - https://www.oracle.com/security-alerts/cpuapr2022.html + - https://www.oracle.com/security-alerts/cpujul2022.html + - https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html +--- diff --git a/advisories/_posts/2020-04-29-CVE-2020-11023.md b/advisories/_posts/2020-04-29-CVE-2020-11023.md new file mode 100644 index 00000000..bda15a51 --- /dev/null +++ b/advisories/_posts/2020-04-29-CVE-2020-11023.md @@ -0,0 +1,34 @@ +--- +layout: advisory +title: 'CVE-2020-11023 (jquery-rails): Potential XSS vulnerability in jQuery' +comments: false +categories: +- jquery-rails +- rails +advisory: + gem: jquery-rails + framework: rails + cve: 2020-11023 + ghsa: jpcq-cgw6-v4j6 + date: 2020-04-29 + url: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released + title: Potential XSS vulnerability in jQuery + description: | + ## Impact + + Passing HTML containing `