Skip to content

Commit b88d29d

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 brand new advisory
1 parent 5b14b03 commit b88d29d

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

gems/actionpack/CVE-2024-54133.yml

+45
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
gem: actionpack
3+
framework: rails
4+
cve: 2024-54133
5+
ghsa: vfm5-rmrh-j26v
6+
url: https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
7+
title: Possible Content Security Policy bypass in Action Dispatch
8+
date: 2024-12-10
9+
description: |
10+
There is a possible Cross Site Scripting (XSS) vulnerability
11+
in the `content_security_policy` helper in Action Pack.
12+
13+
## Impact
14+
15+
Applications which set Content-Security-Policy (CSP) headers
16+
dynamically from untrusted user input may be vulnerable to
17+
carefully crafted inputs being able to inject new directives
18+
into the CSP. This could lead to a bypass of the CSP and its
19+
protection against XSS and other attacks.
20+
21+
## Releases
22+
23+
The fixed releases are available at the normal locations.
24+
25+
## Workarounds
26+
27+
Applications can avoid setting CSP headers dynamically from
28+
untrusted input, or can validate/sanitize that input.
29+
30+
## Credits
31+
32+
Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
33+
cvss_v4: 2.3
34+
unaffected_versions:
35+
- "< 5.2.0"
36+
patched_versions:
37+
- "~> 7.0.8.7"
38+
- "~> 7.1.5.1"
39+
- "~> 7.2.2.1"
40+
- ">= 8.0.0.1"
41+
related:
42+
url:
43+
- https://nvd.nist.gov/vuln/detail/CVE-2024-54133
44+
- https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v
45+
- https://github.com/advisories/GHSA-vfm5-rmrh-j26v

0 commit comments

Comments
 (0)