schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nullclasses
4 values
aliases
stringlengths
2
20
summary
stringlengths
24
115
details
stringlengths
47
1.85k
severity
stringclasses
24 values
affected
stringlengths
90
2.44k
references
stringlengths
161
4.51k
database_specific
stringlengths
131
175
1.4.0
GHSA-jjv7-qpx3-h62q
2021-09-14T19:46:47Z
2017-10-24T18:33:36Z
null
['CVE-2014-7191']
Denial-of-Service Memory Exhaustion in qs
Versions prior to 1.0 of `qs` are affected by a denial of service condition. This condition is triggered by parsing a crafted string that deserializes into very large sparse arrays, resulting in the process running out of memory and eventually crashing. ## Recommendation Update to version 1.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7191'}, {'type': 'WEB', 'url': 'https://github.com/visionmedia/node-querystring/issues/104'}, {'type': 'WEB', 'url': 'https://github.com/raymondfeng/node-querystring/commit/43a604b7847e56bba49d0ce3e222fe89569354d8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1380'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jjv7-qpx3-h62q'}, {'type': 'PACKAGE', 'url': 'https://github.com/visionmedia/node-querystring'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/29'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/60026'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/62170'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21685987'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21687928'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:41Z', 'nvd_published_at': None}
1.4.0
GHSA-vxvp-4xwc-jpp6
2023-01-23T18:04:55Z
2017-10-24T18:33:36Z
null
['CVE-2015-3226']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.4'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228033946/http://www.securityfocus.com/bid/75231'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/17'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:02Z', 'nvd_published_at': None}
1.4.0
GHSA-9fh3-vh3h-q4g3
2023-05-12T17:06:32Z
2017-10-24T18:33:38Z
null
['CVE-2011-2932']
activesupport Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.r`b in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2932.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:22Z', 'nvd_published_at': None}
1.4.0
GHSA-xqg8-cv3h-xppv
2021-09-22T15:12:11Z
2017-10-24T18:33:36Z
null
['CVE-2015-1369']
SQL Injection in sequelize
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter. ## Proof of Concept ```javascript Test.findAndCountAll({ where: { id :1 }, order : [['id', 'UNTRUSTED USER INPUT']] }) ``` ## Recommendation Update to version 2.0.0-rc8 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-rc8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-rc7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/2906'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/2919'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/33'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:08Z', 'nvd_published_at': None}
1.4.0
GHSA-gppp-5xc5-wfpx
2023-08-25T23:11:25Z
2017-10-24T18:33:37Z
null
['CVE-2013-0155']
Active Record allows bypassing of database-query restrictions
Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660 and CVE-2012-2694.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0155'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0155.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bc6f13dafe130ee9?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2609'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:49Z', 'nvd_published_at': None}
1.4.0
GHSA-8qrh-h9m2-5fvf
2023-06-19T21:08:41Z
2017-10-24T18:33:38Z
null
['CVE-2009-3009']
Cross site scripting that affects rails
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3009'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/53036'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8qrh-h9m2-5fvf'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2009-3009.yml'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36600'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/36717'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1022824'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2009/dsa-1887'}, {'type': 'WEB', 'url': 'http://www.osvdb.org/57666'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/36278'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/2544'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:29Z', 'nvd_published_at': None}
1.4.0
GHSA-mgx3-27hr-mfgp
2023-03-14T20:47:11Z
2017-10-24T18:33:37Z
null
['CVE-2013-1801']
HTTParty does not restrict casts of string values
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'httparty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801'}, {'type': 'WEB', 'url': 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=917229'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnunemaker/httparty'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/httparty/CVE-2013-1801.yml'}, {'type': 'WEB', 'url': 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229101716/http://www.securityfocus.com/bid/58260'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:12Z', 'nvd_published_at': None}
1.4.0
GHSA-r9c2-cr39-c8g6
2023-01-24T14:56:23Z
2017-10-24T18:33:36Z
null
['CVE-2015-7579']
rails-html-sanitizer Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the `Rails::Html::FullSanitizer` class.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/12'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:13Z', 'nvd_published_at': None}
1.4.0
GHSA-h77x-m5q8-c29h
2023-08-25T23:23:23Z
2017-10-24T18:33:37Z
null
['CVE-2012-6109']
Rack vulnerable to REDoS
`lib/rack/multipart.rb` in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-6109'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack/'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/blob/master/README.rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2012-6109.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21msg/rack-devel/1w4_fWEgTdI/XAkSNHjtdTsJ'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata/RHSA-2013-0544.html'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:20Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-h5g2-38x9-4gv3
2023-09-05T21:02:41Z
2017-10-24T18:33:35Z
null
['CVE-2016-10173']
archive-tar-minitar and minitar vulnerable to Path Traversal
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a `..` (dot dot) in a TAR archive entry.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'archive-tar-minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'minitar'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10173'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/halostatue/minitar'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201702-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170214020917/http://www.securityfocus.com/bid/95874'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207111726/https://www.puppet.com/security/cve/cve-2016-10173'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3778'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/24/7'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/29/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:02Z', 'nvd_published_at': None}
1.4.0
GHSA-3fx5-fwvr-xrjg
2021-09-22T20:19:52Z
2017-10-24T18:33:36Z
null
['CVE-2015-8315']
Regular Expression Denial of Service in ms
Versions of `ms` prior to 0.7.1 are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed. ## Proof of Concept ```javascript var ms = require('ms'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } ms(genstr(process.argv[2], "5") + " minutea"); ``` ### Results Showing increase in execution time based on the input string. ``` $ time node ms.js 10000 real 0m0.758s user 0m0.724s sys 0m0.031s $ time node ms.js 20000 real 0m2.580s user 0m2.494s sys 0m0.047s $ time node ms.js 30000 real 0m5.747s user 0m5.483s sys 0m0.080s $ time node ms.js 80000 real 0m41.022s user 0m38.894s sys 0m0.529s ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8315'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/millisecond/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K46337613?utm_source=f5support&amp;utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96389'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:05Z', 'nvd_published_at': None}
1.4.0
GHSA-gfjr-3jmm-4g9v
2021-09-10T20:53:22Z
2017-10-24T18:33:36Z
null
['CVE-2015-8860']
Symlink Arbitrary File Overwrite in tar
Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory. ## Recommendation Update to version 2.0.0 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/npm'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm/releases/tag/v2.7.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/57'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:06Z', 'nvd_published_at': None}
1.4.0
GHSA-6mq2-37j5-w6r6
2023-08-01T21:37:33Z
2017-10-24T18:33:38Z
null
['CVE-2009-4492']
WEBrick Improper Input Validation vulnerability
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/webrick'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100113155532/http://www.vupen.com/english/advisories/2010/0089'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20100815010948/http://secunia.com/advisories/37949'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170402100552/http://securitytracker.com/id?1023429'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170908140655/http://www.securityfocus.com/archive/1/508830/100/0/threaded'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228145937/http://www.securityfocus.com/bid/37710'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0908.html'}, {'type': 'WEB', 'url': 'http://www.redhat.com/support/errata/RHSA-2011-0909.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection'}, {'type': 'WEB', 'url': 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:44Z', 'nvd_published_at': None}
1.4.0
GHSA-vxf6-w9mp-95hm
2023-05-12T17:24:42Z
2017-10-24T18:33:38Z
null
['CVE-2012-3408']
Puppet supports use of IP addresses in certnames without warning of potential risks
`lib/puppet/network/authstore.rb` in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839166'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3408.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3408-agent-impersonation'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3408/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:51Z', 'nvd_published_at': '2012-08-06T16:55:00Z'}
1.4.0
GHSA-59c7-4xj2-hgvw
2023-01-23T20:38:10Z
2017-10-24T18:33:36Z
null
['CVE-2015-7578']
rails-html-sanitizer Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:19Z', 'nvd_published_at': None}
1.4.0
GHSA-v3rr-cph9-2g2q
2023-01-23T18:02:54Z
2017-10-24T18:33:36Z
null
['CVE-2014-2538']
rack-ssl Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `lib/rack/ssl.rb` in the rack-ssl gem before 1.4.0 for Ruby allows remote attackers to inject arbitrary web script or HTML via a URI, which might not be properly handled by third-party adapters such as JRuby-Rack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-ssl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2538'}, {'type': 'WEB', 'url': 'https://github.com/josh/rack-ssl/commit/9d7d7300b907e496db68d89d07fbc2e0df0b487b'}, {'type': 'PACKAGE', 'url': 'https://github.com/josh/rack-ssl'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack-ssl/CVE-2014-2538.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140524002455/http://secunia.com/advisories/57466'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228185649/http://www.securityfocus.com/bid/66314'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-04/msg00032.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/03/19/20'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:31Z', 'nvd_published_at': None}
1.4.0
GHSA-8fqx-7pv4-3jwm
2023-05-26T16:54:58Z
2017-10-24T18:33:38Z
null
['CVE-2008-7248']
Improper Input Validation in actionpack
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2008-7248'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=544329'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2008-7248.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'https://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20090906010200/https://www.vupen.com/english/advisories/2009/2544'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2009/12/02/2'}, {'type': 'WEB', 'url': 'https://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/28/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/02/2'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:28Z', 'nvd_published_at': '2009-12-16T01:30:00Z'}
1.4.0
GHSA-fcqf-h4h4-695m
2023-07-19T18:42:54Z
2017-10-24T18:33:38Z
null
['CVE-2011-3186']
actionpack CRLF injection vulnerability
CRLF injection vulnerability in `actionpack/lib/action_controller/response.rb` in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3186'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=732156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3186.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/b_yTveAph2g'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150201000000*/http://secunia.com/advisories/45921'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:21Z', 'nvd_published_at': None}
1.4.0
GHSA-cfjh-p3g4-3q2f
2021-09-09T17:02:02Z
2017-10-24T18:33:36Z
null
['CVE-2015-1370']
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0.3.3 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/issues/492'}, {'type': 'WEB', 'url': 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/24/versions'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/01/23/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:22Z', 'nvd_published_at': None}
1.4.0
GHSA-jxx8-v83v-rhw3
2023-08-29T09:24:34Z
2017-10-24T18:33:37Z
null
['CVE-2013-1656']
Spree Improper Input Validation vulnerability
Spree Commerce 1.0.x before 2.0.0.rc1 allows remote authenticated administrators to instantiate arbitrary Ruby objects and execute arbitrary commands via the (1) `payment_method` parameter to `core/app/controllers/spree/admin/payment_methods_controller.rb`; and the (2) `promotion_action parameter` to `promotion_actions_controller.rb`, (3) `promotion_rule parameter` to `promotion_rules_controller.rb`, and (4) `calculator_type` parameter to `promotions_controller.rb` in `promo/app/controllers/spree/admin/`, related to unsafe use of the constantize function.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0.rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree/commit/70092eb55b8be8fe5d21a7658b62da658612fba7'}, {'type': 'WEB', 'url': 'https://blog.convisoappsec.com/en/spree-commerce-multiple-unsafe-reflection-vulnerabilities-cve-2013-1656'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree/CVE-2013-1656.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130907044454/https://www.conviso.com.br/advisories/CVE-2013-1656.txt'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140329142330/http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140618100330/http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:31Z', 'nvd_published_at': None}
1.4.0
GHSA-w6rc-q387-vpgq
2023-06-09T20:17:24Z
2017-10-24T18:33:37Z
null
['CVE-2013-4136']
insecure temporary directory usage in passenger
ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b'}, {'type': 'WEB', 'url': 'https://code.google.com/p/phusion-passenger/issues/detail?id=910'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w6rc-q387-vpgq'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passenger'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-4136.yml'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/07/16/6'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:27Z', 'nvd_published_at': None}
1.4.0
GHSA-j24p-r6wx-r79w
2021-09-14T18:09:44Z
2017-10-24T18:33:38Z
null
['CVE-2009-3287']
High severity vulnerability that affects thin
lib/thin/connection.rb in Thin web server before 1.2.4 relies on the X-Forwarded-For header to determine the IP address of the client, which allows remote attackers to spoof the IP address and hide activities via a modified X-Forwarded-For header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'thin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3287'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j24p-r6wx-r79w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/thin/CVE-2009-3287.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/macournoyer/thin'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/blob/master/CHANGELOG'}, {'type': 'WEB', 'url': 'http://github.com/macournoyer/thin/commit/7bd027914c5ffd36bb408ef47dc749de3b6e063a'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/09/12/1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:36Z', 'nvd_published_at': None}
1.4.0
GHSA-xrr4-p6fq-hjg7
2023-07-05T20:50:18Z
2017-10-24T18:33:35Z
null
['CVE-2016-0752']
Directory traversal vulnerability in Action View in Ruby on Rails
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` (dot dot) in a pathname.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrr4-p6fq-hjg7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-0752.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/335P1DcLG00'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210618005620/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210621170450/http://www.securityfocus.com/bid/81801'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210723192420/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40561/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/13'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:24Z', 'nvd_published_at': None}
1.4.0
GHSA-mpxf-gcw2-pw5q
2023-07-31T18:14:44Z
2017-10-24T18:33:37Z
null
['CVE-2013-6414']
actionpack Improper Input Validation vulnerability
`actionpack/lib/action_view/lookup_context.rb` in Action View in Ruby on Rails 3.x before 3.2.16 and 4.x before 4.0.2 allows remote attackers to cause a denial of service (memory consumption) via a header containing an invalid MIME type that leads to excessive caching.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6414'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6414.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/A-ebV4WxzKg'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/A-ebV4WxzKg/KNPTbX8XAQUJ'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160421165124/http://secunia.com/advisories/57836'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160808161629/https://puppet.com/security/cve/cve-2013-6414'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00079.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00081.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00082.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1794.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0008.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-1863.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2014/dsa-2888'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:47Z', 'nvd_published_at': None}
1.4.0
GHSA-w37c-q653-qg95
2023-07-26T18:41:29Z
2017-10-24T18:33:36Z
null
['CVE-2013-6416']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the simple_format helper in `actionpack/lib/action_view/helpers/text_helper.rb` in Ruby on Rails 4.x before 4.0.2 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML attribute.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6416'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4b4f5847f64f81c961625e647711ef9f6ad1a454'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-6416.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/5ZI1-H5OoIM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/5ZI1-H5OoIM/ZNq4FoR2GnIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228165109/http://www.securityfocus.com/bid/64071'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:19Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}
1.4.0
GHSA-v2r9-c84j-v7xm
2023-07-05T20:39:56Z
2017-10-24T18:33:37Z
null
['CVE-2013-0256']
RDoc contains XSS vulnerability
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '3.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256'}, {'type': 'WEB', 'url': 'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=907820'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v2r9-c84j-v7xm'}, {'type': 'PACKAGE', 'url': 'https://github.com/rdoc/rdoc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2013-0256.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130402173730/http://blog.segment7.net:80/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-02/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0701.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0728.html'}, {'type': 'WEB', 'url': 'http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1733-1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:28Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-87vv-r9j6-g5qv
2022-06-07T14:31:25Z
2017-10-24T18:33:35Z
null
['CVE-2016-4055']
Regular Expression Denial of Service in moment
Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`. ## Proof of concept ``` var moment = require('moment'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=20000;i<=10000000;i=i+10000) { console.log("COUNT: " + i); var str = '-' + genstr(i, '1') console.log("LENGTH: " + str.length); var start = process.hrtime(); moment.duration(str) var end = process.hrtime(start); console.log(end); } ``` ### Results ``` $ node moment.js COUNT: 20000 LENGTH: 20002 [ 0, 618931029 ] COUNT: 30001 LENGTH: 30003 [ 1, 401413894 ] COUNT: 40002 LENGTH: 40004 [ 2, 437075303 ] COUNT: 50003 LENGTH: 50005 [ 3, 824664804 ] COUNT: 60004 LENGTH: 60006 [ 5, 651335262 ] ``` ## Recommendation Please update to version 2.11.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/55'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-02'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/95849'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:44Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}
1.4.0
GHSA-78j3-7wpm-qhvp
2023-07-05T19:12:35Z
2017-10-24T18:33:37Z
null
['CVE-2013-1947']
Shell Metacharacter Injection in kelredd-pruview
kelredd-pruview gem 0.3.8 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename argument to document.rb, video.rb, or video_image.rb.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kelredd-pruview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1947'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-78j3-7wpm-qhvp'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/kelredd-pruview/CVE-2013-1947.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/kelredd-pruview-cmd-inject.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/10/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/04/12/2'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:10Z', 'nvd_published_at': None}
1.4.0
GHSA-5vx5-9q73-wgp4
2023-09-05T21:30:18Z
2017-10-24T18:33:35Z
null
['CVE-2017-7540']
Safemode Gem Has Incomplete List of Disallowed Inputs
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7540'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/pull/23'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/safemode/CVE-2017-7540.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}]
{'cwe_ids': ['CWE-184'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:24Z', 'nvd_published_at': '2017-07-21T22:29:00Z'}
1.4.0
GHSA-gr44-7grc-37vq
2023-01-23T17:23:13Z
2017-10-24T18:33:37Z
null
['CVE-2013-0276']
ActiveRecord vulnerable to modification of protected model attributes
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0276'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0276.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/bb44b98a73ef1a06?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130217055442/http://www.securityfocus.com/bid/57896'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/5'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:57Z', 'nvd_published_at': None}
1.4.0
GHSA-9qj7-jvg4-qr2x
2023-07-05T18:50:18Z
2017-10-24T18:33:37Z
null
['CVE-2013-2119']
Phusion Passenger Denial of Service
Phusion Passenger gem before 3.0.21 and 4.0.x before 4.0.5 for Ruby allows local users to cause a denial of service (prevent application start) or gain privileges by pre-creating a temporary "config" file in a directory with a predictable name in `/tmp/` before it is used by the gem.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.1'}, {'fixed': '4.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2119'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=892813'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9qj7-jvg4-qr2x'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/passenger/CVE-2013-2119.yml'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-3-0-21-released/'}, {'type': 'WEB', 'url': 'http://blog.phusion.nl/2013/05/29/phusion-passenger-4-0-5-released/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1136.html'}]
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:24Z', 'nvd_published_at': '2014-01-03T18:54:00Z'}
1.4.0
GHSA-p65m-qr5x-rrqq
2023-01-26T21:22:44Z
2017-10-24T18:33:36Z
null
['CVE-2013-7086']
Webbynode Code Injection vulnerability
The message function in `lib/webbynode/notify.rb` in the Webbynode gem 1.0.5.3 and earlier for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a growlnotify message.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webbynode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7086'}, {'type': 'WEB', 'url': 'https://github.com/webbynode/webbynode/pull/85'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89705'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/webbynode/CVE-2013-7086.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/webbynode/webbynode'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229074410/http://www.securityfocus.com/bid/64289'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208124343/http://www.vapid.dhs.org/advisories/webbynode-command-inj.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/124421'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/493'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/497'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:09Z', 'nvd_published_at': None}
1.4.0
GHSA-jmgf-p46x-982h
2023-05-11T13:47:53Z
2017-10-24T18:33:38Z
null
['CVE-2008-5189']
rails is vulnerable to CRLF injection
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jmgf-p46x-982h'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2008-5189.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/32359'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:46Z', 'nvd_published_at': None}
1.4.0
GHSA-3pxh-h8hw-mj8w
2023-08-28T12:50:30Z
2017-10-24T18:33:37Z
null
['CVE-2013-0183']
Rack rubygems receiving excessively long lines triggers out-of-memory error
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0544'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=895282'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2013-0183.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/-MWPHDeGWtI'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%21topic/rack-devel/7ZKPNAjgRSs'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://rack.github.com/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0544.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0548.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2783'}]
{'cwe_ids': ['CWE-119', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:49Z', 'nvd_published_at': '2013-03-01T05:40:00Z'}
1.4.0
GHSA-jmgw-6vjg-jjwg
2023-02-15T22:22:59Z
2017-10-24T18:33:37Z
null
['CVE-2013-0156']
actionpack Improper Input Validation vulnerability
`active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.19'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0156'}, {'type': 'WEB', 'url': 'https://community.rapid7.com/community/metasploit/blog/2013/01/09/serialization-mischief-in-ruby-land-cve-2013-0156'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/c1432d0f8c70e89d?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140111025708/http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160415043747/https://ics-cert.us-cert.gov/advisories/ICSA-13-036-01A'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160806154149/https://puppet.com/security/cve/cve-2013-0156/'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0153.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0155.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/1/28/Rails-3-0-20-and-2-3-16-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2604'}, {'type': 'WEB', 'url': 'http://www.fujitsu.com/global/support/software/security/products-f/sw-sv-rcve-ror201301e.html'}, {'type': 'WEB', 'url': 'http://www.insinuator.net/2013/01/rails-yaml/'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/380039'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/628463'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:48Z', 'nvd_published_at': '2013-01-13T22:55:00Z'}
1.4.0
GHSA-fh39-v733-mxfr
2023-03-14T22:18:13Z
2017-10-24T18:33:38Z
null
['CVE-2012-2661']
Active Record vulnerable to SQL Injection via nested query parameters
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:40Z', 'nvd_published_at': None}
1.4.0
GHSA-cj92-c4fj-w9c5
2023-09-05T21:10:15Z
2017-10-24T18:33:38Z
null
['CVE-2012-2139']
Mail Gem Path Traversal vulnerability
Directory traversal vulnerability in `lib/mail/network/delivery_methods/file_delivery.rb` in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary files via a `..` (dot dot) in the to parameter.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2139'}, {'type': 'WEB', 'url': 'https://github.com/mikel/mail/commit/29aca25218e4c82991400eb9b0c933626aefc98f'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=759092'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=816352'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikel/mail'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/25/8'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2012/04/26/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:54Z', 'nvd_published_at': None}
1.4.0
GHSA-q4qq-fm7q-cwp5
2021-09-16T19:30:36Z
2017-10-24T18:33:36Z
null
['CVE-2013-7454']
Multiple XSS Filter Bypasses in validator
Versions of `validator` prior to 1.1.0 are affected by several cross-site scripting vulnerabilities due to bypasses discovered in the blacklist-based filter. ## Proof of Concept Various inputs that could bypass the filter were discovered: Improper parsing of nested tags: ``` <s <onmouseover="alert(1)"> <;s onmouseover="alert(1)">This is a test</s> ``` Incomplete filtering of javascript: URIs: ``` <a href="javascriptJ a V a S c R iPt::alert(1)" "<s>">test</a> ``` UI Redressing: ``` <div style="z-index: 9999999; background-color: green; width: 100%; height: 100%"> <h1>You have won</h1>Please click the link and enter your login details: <a href="http://example.com/">http://good.com</a> </div> ``` Bypass via Nested Forbidden Strings: ``` <scrRedirecRedirect 302t 302ipt type="text/javascript">prompt(1);</scrRedirecRedirect 302t 302ipt> ``` Additional bypasses were discovered by Krzysztof Kotowicz in 2012 when auditing CodeIgniter's XSS filtering function, which this code was based off of. ## Recommendation If you are a developer currently using the xss filter function from the validator package, you should consider replacing it with the escape filter function from the same package. This function replaces all instances of angle brackets (<, >), ampersands, and quotation marks, so no HTML tags will be processed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7454'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q4qq-fm7q-cwp5'}, {'type': 'WEB', 'url': 'https://nealpoole.com/blog/2013/07/xss-filter-bypass-in-validator-nodejs-module/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/41'}, {'type': 'WEB', 'url': 'http://blog.kotowicz.net/2012/07/codeigniter-210-xssclean-cross-site.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:57Z', 'nvd_published_at': None}
1.4.0
GHSA-76wq-xw4h-f8wj
2023-05-12T17:04:06Z
2017-10-24T18:33:38Z
null
['CVE-2012-2695']
activerecord vulnerable to SQL Injection
The Active Record component in Ruby on Rails before 3.0.14, 3.1.x before 3.1.6, and 3.2.x before 3.2.6 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage improper handling of nested hashes, a related issue to CVE-2012-2661.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2695'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2012-2695.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/l4L0TEVAz1k/m/Vr84sD9B464J'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/aee3413fb038bf56?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00002.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:41Z', 'nvd_published_at': None}
1.4.0
GHSA-jg4m-q6w8-vrjp
2023-01-26T21:04:14Z
2017-10-24T18:33:37Z
null
['CVE-2013-4203']
rgpg Code Injection vulnerability
The `self.run_gpg` function in `lib/rgpg/gpg_helper.rb` in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rgpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}, {'type': 'WEB', 'url': 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}, {'type': 'PACKAGE', 'url': 'https://github.com/rcook/rgpg'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rgpg/CVE-2013-4203.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/08/03/2'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:21Z', 'nvd_published_at': None}
1.4.0
GHSA-574q-fxfj-wv6h
2023-05-12T17:26:05Z
2017-10-24T18:33:37Z
null
['CVE-2013-1655']
Puppet Improper Input Validation vulnerability
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, when running Ruby 1.9.3 or later, allows remote attackers to execute arbitrary code via vectors related to "serialized attributes."
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1655'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2013-1655.yml'}, {'type': 'WEB', 'url': 'https://puppetlabs.com/security/cve/cve-2013-1655/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228144801/http://www.securityfocus.com/bid/58442'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2013-1655-unauthenticated-remote-code-execution-vulnerability'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00004.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00056.html'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1759-1'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2643'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:17Z', 'nvd_published_at': None}
1.4.0
GHSA-5726-g6r9-5f22
2022-02-25T19:54:10Z
2017-10-24T18:33:36Z
null
['CVE-2014-7192']
Potential for Script Injection in syntax-error
Versions of `syntax-error` prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified. ## Recommendation Update to version 1.1.1 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'syntax-error'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7192'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-syntax-error/commit/9aa4e66eb90ec595d2dba55e6f9c2dd9a668b309'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96728'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5726-g6r9-5f22'}, {'type': 'WEB', 'url': 'https://github.com/substack/node-browserify/blob/master/changelog.markdown#421'}, {'type': 'PACKAGE', 'url': 'https://github.com/substack/node-syntax-error'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/37'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21690815'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:12Z', 'nvd_published_at': None}
1.4.0
GHSA-w754-gq8r-pf5f
2023-08-29T14:01:28Z
2017-10-24T18:33:37Z
null
['CVE-2013-2616']
MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection
`lib/mini_magick.rb` in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2013-2616.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130315095512/http://www.securityfocus.com/bid/58448'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Mar/123'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/19/9'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:55Z', 'nvd_published_at': None}
1.4.0
GHSA-ww79-8xwv-932x
2023-08-28T16:11:35Z
2017-10-24T18:33:36Z
null
['CVE-2014-0036']
rbovirt uses the rest-client gem with SSL verification disabled
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rbovirt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0036'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1058595'}, {'type': 'PACKAGE', 'url': 'https://github.com/abenari/rbovirt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rbovirt/CVE-2014-0036.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130148.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/130180.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/509'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:20Z', 'nvd_published_at': None}
1.4.0
GHSA-8r6h-7x9g-xmw9
2023-01-23T20:49:57Z
2017-10-24T18:33:36Z
null
['CVE-2013-6459']
will_paginate Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in the will_paginate gem before 3.0.5 for Ruby allows remote attackers to inject arbitrary web script or HTML via vectors involving generated pagination links.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'will_paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6459'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/mislav/will_paginate'}, {'type': 'WEB', 'url': 'https://github.com/mislav/will_paginate/releases/tag/v3.0.5'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150709163604/http://www.securityfocus.com/bid/64509'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:31Z', 'nvd_published_at': None}
1.4.0
GHSA-rxq3-gm4p-5fj4
2023-05-11T13:58:44Z
2017-10-24T18:33:38Z
null
['CVE-2009-2422']
rails vulnerable to improper authentication
The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2422'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/51528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rxq3-gm4p-5fj4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-2422.yml'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://n8.tumblr.com/post/117477059/security-hole-found-in-rails-2-3s'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/35702'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/6/3/security-problem-with-authenticate_with_http_digest'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/35579'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/1802'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:22Z', 'nvd_published_at': None}
1.4.0
GHSA-qrgf-jqqm-x7xv
2023-01-24T14:54:19Z
2017-10-24T18:33:37Z
null
['CVE-2013-5671']
Code injection in dragonfly gem
`lib/dragonfly/imagemagickutils.rb` in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'fog-dragonfly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}, {'type': 'WEB', 'url': 'https://github.com/markevans/dragonfly/issues/520'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/pull/486'}, {'type': 'PACKAGE', 'url': 'https://github.com/markevans/dragonfly'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208033320/http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2013/Sep/18'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/526'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q3/528'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:41Z', 'nvd_published_at': None}
1.4.0
GHSA-jxhw-mg8m-2pj8
2023-01-23T21:20:12Z
2017-10-24T18:33:37Z
null
['CVE-2013-0233']
Devise does not properly perform type conversion when performing database queries
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0233'}, {'type': 'WEB', 'url': 'https://github.com/Snorby/snorby/issues/261'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140726005251/http://www.phenoelit.org/blog/archives/2013/02/05/mysql_madness_and_rails/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229103406/http://www.securityfocus.com/bid/57577'}, {'type': 'WEB', 'url': 'http://blog.plataformatec.com.br/2013/01/security-announcement-devise-v2-2-3-v2-1-3-v2-0-5-and-v1-5-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00000.html'}, {'type': 'WEB', 'url': 'http://www.metasploit.com/modules/auxiliary/admin/http/rails_devise_pass_reset'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/01/29/3'}]
{'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:21Z', 'nvd_published_at': None}
1.4.0
GHSA-xf96-32q2-9rw2
2023-05-26T16:40:08Z
2017-10-24T18:33:38Z
null
['CVE-2008-4094']
Rails ActiveRecord gem vulnerable to SQL injection
Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) `:limit` and (2) `:offset` parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-4094'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ef0ea782b1f5cf7b08e74ea3002a16c708f66645'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/45109'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2008-4094.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620000955/http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201733/http://blog.innerewut.de/files/rails/activerecord-1.15.3.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080620201744/http://blog.innerewut.de/files/rails/activerecord-2.0.2.patch'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081104151751/http://gist.github.com/8946'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081113122736/http://secunia.com/advisories/31875/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211431/http://secunia.com/advisories/31909'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20081207211436/http://secunia.com/advisories/31910'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20091101000000*/http://www.vupen.com/english/advisories/2008/2562'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120120194518/http://www.securityfocus.com/bid/31176'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207112829/http://www.securitytracker.com/id?1020871'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/288'}, {'type': 'WEB', 'url': 'http://rails.lighthouseapp.com/projects/8994/tickets/964'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/13/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2008/09/16/1'}, {'type': 'WEB', 'url': 'http://www.rorsecurity.info/2008/09/08/sql-injection-issue-in-limit-and-offset-parameter'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:04Z', 'nvd_published_at': None}
1.4.0
GHSA-fqrr-rrwg-69pv
2023-07-05T18:46:48Z
2017-10-24T18:33:36Z
null
['CVE-2014-1233']
Local API Login Credentials Disclosure in paratrooper-pingdom
The paratrooper-pingdom gem 1.0.0 for Ruby allows local users to obtain the App-Key, username, and password values by listing the curl process. ### Vulnerable Code: From: `paratrooper-pingdom-1.0.0/lib/paratrooper-pingdom.rb` ```ruby def setup(options = {}) %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=true" -H "App-Key: #{app_key}" -u "#{username}:#{password}"] end def teardown(options = {}) %x[curl https://api.pingdom.com/api/2.0/checks -X PUT -d "paused=false" -H "App-Key: #{app_key}" -u "#{username}:#{password}"] end ``` A malicious user could monitor the process tree to steal the API key, username and password for the API login.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paratrooper-pingdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1233'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fqrr-rrwg-69pv'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paratrooper-pingdom/CVE-2014-1233.yml'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/01/08/1'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/paratrooper-api-key-pingdom.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:08Z', 'nvd_published_at': '2014-01-10T12:02:00Z'}
1.4.0
GHSA-543v-gj2c-r3ch
2023-06-30T21:32:03Z
2017-10-24T18:33:35Z
null
['CVE-2016-0753']
activemodel contains Improper Input Validation
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activemodel/CVE-2016-0753.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/6jQVC1geukQ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160405205300/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228000230/http://www.securityfocus.com/bid/82247'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210613054843/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/14'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:56Z', 'nvd_published_at': None}
1.4.0
GHSA-552w-rqg8-gxxm
2021-09-01T19:26:29Z
2017-10-24T18:33:36Z
null
['CVE-2013-7453']
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the cross-site scripting (XSS) filter via vectors related to UI redressing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7453'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-552w-rqg8-gxxm'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:02Z', 'nvd_published_at': None}
1.4.0
GHSA-c5qq-g673-5p49
2023-05-12T17:08:19Z
2017-10-24T18:33:38Z
null
['CVE-2012-1989']
Puppet allows local users to overwrite arbitrary files via a symlink attack
`telnet.rb` in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (`/tmp/out.log`).
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.1'}, {'fixed': '2.7.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-1989.yml'}, {'type': 'WEB', 'url': 'https://hermes.opensuse.org/messages/15087408'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120415105345/http://www.securityfocus.com/bid/52975'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-1989-arbitrary-file-write-access'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/issues/13606'}, {'type': 'WEB', 'url': 'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-1989/'}, {'type': 'WEB', 'url': 'http://ubuntu.com/usn/usn-1419-1'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:16Z', 'nvd_published_at': None}
1.4.0
GHSA-hqf9-rc9j-5fmj
2023-07-05T17:50:02Z
2017-10-24T18:33:36Z
null
['CVE-2014-0080']
Array data injection vulnerability in activerecord
SQL injection vulnerability in `activerecord/lib/active_record/connection_adapters/postgresql/cast.rb` in Active Record in Ruby on Rails 4.0.x before 4.0.3, and 4.1.0.beta1, when PostgreSQL is used, allows remote attackers to execute "add data" SQL commands via vectors involving `\` (backslash) characters that are not properly handled in operations on array columns.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0.beta1'}, {'fixed': '4.1.0.beta2'}]}], 'versions': ['4.1.0.beta1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0080'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hqf9-rc9j-5fmj'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/main/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2014-0080.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210301004521/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/Wu96YkTUR6s/pPLBMZrlwvYJ'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/9'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:47Z', 'nvd_published_at': None}
1.4.0
GHSA-73qw-ww62-m54x
2023-01-25T23:05:06Z
2017-10-24T18:33:36Z
null
['CVE-2015-7541']
colorscore Command Injection vulnerability
The initialize method in the Histogram class in `lib/colorscore/histogram.rb` in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) `image_path`, (2) `colors`, or (3) `depth` variable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'colorscore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}, {'type': 'WEB', 'url': 'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718'}, {'type': 'PACKAGE', 'url': 'https://github.com/quadule/colorscore'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/colorscore/CVE-2015-7541.yml'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2015-7541/'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q1/17'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/05/2'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:15Z', 'nvd_published_at': None}
1.4.0
GHSA-f7f4-5w9j-23p2
2023-01-25T23:16:58Z
2017-10-24T18:33:35Z
null
['CVE-2016-10194']
festivaltts4r allows arbitrary command execution
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'festivaltts4r'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194'}, {'type': 'WEB', 'url': 'https://github.com/spejman/festivaltts4r/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/spejman/festivaltts4r'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vx9j-46rh-fqr8
2023-07-05T20:44:17Z
2017-10-24T18:33:35Z
null
['CVE-2016-2097']
actionview contains Path Traversal vulnerability
There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097. Versions Affected: 3.2.x, 4.0.x, 4.1.x Not affected: 4.2+ Fixed Versions: 3.2.22.2, 4.1.14.2 Impact ------ Applications that pass unverified user input to the `render` method in a controller may be vulnerable to an information leak vulnerability. Impacted code will look something like this: ```ruby def index render params[:id] end ``` Carefully crafted requests can cause the above code to render files from unexpected places like outside the application's view directory, and can possibly escalate this to a remote code execution attack. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The FIXED releases are available at the normal locations. Workarounds ----------- A workaround to this issue is to not pass arbitrary user input to the `render` method. Instead, verify that data before passing it to the `render` method. For example, change this: ```ruby def index render params[:id] end ``` To this: ```ruby def index render verify_template(params[:id]) end private def verify_template(name) # add verification logic particular to your application here end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for it. It is in git-am format and consist of a single changeset. * 3-2-render_data_leak_2.patch - Patch for 3.2 series * 4-1-render_data_leak_2.patch - Patch for 4.1 series Credits ------- Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this and working with us in the patch!
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a1d3ea617ffb0c8ae8467fa439bf63a3bfc4324'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2016-2097.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ddY6HgqB2z4'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160322002234/http://www.securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015320/http://www.securityfocus.com/bid/83726'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201221115217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:49Z', 'nvd_published_at': None}
1.4.0
GHSA-c9c5-9fpr-m882
2023-01-25T23:16:15Z
2017-10-24T18:33:36Z
null
['CVE-2014-9490']
sentry-raven allows remote attackers to cause a denial of service via a large exponent value in a scientific number
The `numtok` function in `lib/raven/okjson.rb` in the raven-ruby gem before 0.12.2 for Ruby allows remote attackers to cause a denial of service via a large exponent value in a scientific number.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sentry-raven'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9490'}, {'type': 'WEB', 'url': 'https://github.com/getsentry/raven-ruby/commit/477ee93a3f735be33bc1e726820654cdf6e22d8f'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99687'}, {'type': 'PACKAGE', 'url': 'https://github.com/getsentry/raven-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sentry-raven/CVE-2014-9490.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/getsentry/Cz5bih0ZY1U'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2015/q1/26'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:45Z', 'nvd_published_at': None}
1.4.0
GHSA-v633-x5vv-hqwc
2021-09-20T15:12:25Z
2017-10-24T18:33:36Z
null
['CVE-2015-8856']
Cross-Site Scripting in serve-index
Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application. ## Recommendation Update to version 1.6.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'serve-index'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/issues/28'}, {'type': 'WEB', 'url': 'https://github.com/expressjs/serve-index/commit/7381a1d1458959e57ee53ac932b06ff17904777e'}, {'type': 'PACKAGE', 'url': 'https://github.com/expressjs/serve-index'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227190911/http://www.securityfocus.com/bid/96392'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:54Z', 'nvd_published_at': None}
1.4.0
GHSA-4jm3-pfpf-h54p
2023-01-25T22:57:24Z
2017-10-24T18:33:35Z
null
['CVE-2016-10193']
espeak-ruby allows arbitrary command execution
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the `speak`, `save`, `bytes` or `bytes_wav` method in `lib/espeak/speech.rb`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'espeak-ruby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10193'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/dejan/espeak-ruby/commit/5251744b13bdd9fb0c72c612226e72d330bac143'}, {'type': 'PACKAGE', 'url': 'https://github.com/dejan/espeak-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/espeak-ruby/CVE-2016-10193.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/01/31/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2017/02/02/5'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:29Z', 'nvd_published_at': None}
1.4.0
GHSA-6x46-7rrv-m4h8
2023-05-12T16:04:23Z
2017-10-24T18:33:38Z
null
['CVE-2011-0995']
sqlite3-ruby uses weak permissions for unspecified files, which allows local users to gain privileges
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0995'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67263'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sqlite3-ruby/CVE-2011-0995.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/schuyler/sqlite3-ruby'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20110513184951/http://support.novell.com/security/cve/CVE-2011-0995.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229151908/http://www.securityfocus.com/bid/47694'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201106213407/https://bugzilla.novell.com/show_bug.cgi?id=685928'}, {'type': 'WEB', 'url': 'https://www.suse.com/security/cve/CVE-2011-0995.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:29Z', 'nvd_published_at': None}
1.4.0
GHSA-9h6g-gp95-x3q5
2022-04-25T20:52:00Z
2017-10-24T18:33:36Z
null
['CVE-2015-7581']
actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2015-7581.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/dthJ5wL69JE'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/dthJ5wL69JE/IdvCimtZEgAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228001849/http://www.securityfocus.com/bid/81677'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200516093752/http://www.securitytracker.com/id/1034816'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/16'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:45Z', 'nvd_published_at': None}
1.4.0
GHSA-mx9f-w8qq-q5jf
2023-01-23T21:26:28Z
2017-10-24T18:33:36Z
null
['CVE-2015-3448']
rest-client allows local users to obtain sensitive information by reading the log
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3448'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/349'}, {'type': 'PACKAGE', 'url': 'https://github.com/rest-client/rest-client'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228154247/http://www.securityfocus.com/bid/74415'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-04/msg00026.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:35Z', 'nvd_published_at': None}
1.4.0
GHSA-fjfg-q662-gm6j
2023-05-11T13:40:44Z
2017-10-24T18:33:38Z
null
['CVE-2007-5379']
Moderate severity vulnerability that affects rails
Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5379'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fjfg-q662-gm6j'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2007-5379.yml'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=195315'}, {'type': 'WEB', 'url': 'http://dev.rubyonrails.org/ticket/8453'}, {'type': 'WEB', 'url': 'http://docs.info.apple.com/article.html?artnum=307179'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html'}, {'type': 'WEB', 'url': 'http://osvdb.org/40717'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/27657'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/28136'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200711-17.xml'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/26096'}, {'type': 'WEB', 'url': 'http://www.us-cert.gov/cas/techalerts/TA07-352A.html'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/3508'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2007/4238'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:46Z', 'nvd_published_at': None}
1.4.0
GHSA-8jxj-9r5f-w3m2
2023-05-12T17:05:34Z
2017-10-24T18:33:37Z
null
['CVE-2012-3866']
Puppet allows local users to obtain sensitive configuration information
`lib/puppet/defaults.rb` in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for `last_run_report.yaml`, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'}, {'type': 'PACKAGE', 'url': 'https://github.com/puppetlabs/puppet'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2012-3866.yml'}, {'type': 'WEB', 'url': 'https://www.puppet.com/security/cve/cve-2012-3866-lastrunreportyaml-world-readable'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html'}, {'type': 'WEB', 'url': 'http://puppetlabs.com/security/cve/cve-2012-3866/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2012/dsa-2511'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-1506-1'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:49Z', 'nvd_published_at': None}
1.4.0
GHSA-7cgp-c3g7-qvrw
2023-06-30T21:25:19Z
2017-10-24T18:33:36Z
null
['CVE-2014-0082']
actionpack Improper Input Validation vulnerability
`actionpack/lib/action_view/template/text.rb` in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the `:text` option to the `render` method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0082'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0082.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207044540/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/LMxO_3_eCuc/ozGBEhKaJbIJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220315115444/https://puppet.com/security/cve/cve-2014-0082'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/10'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}, {'type': 'WEB', 'url': 'http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:28Z', 'nvd_published_at': None}
1.4.0
GHSA-c92m-rrrc-q5wf
2023-09-05T21:11:43Z
2017-10-24T18:33:35Z
null
['CVE-2016-3693']
safemode gem allows context-dependent attackers to obtain sensitive information via the inspect method
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'safemode'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/safemode'}, {'type': 'WEB', 'url': 'http://projects.theforeman.org/issues/14635'}, {'type': 'WEB', 'url': 'http://rubysec.com/advisories/CVE-2016-3693/'}, {'type': 'WEB', 'url': 'http://theforeman.org/security.html#2016-3693'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/8'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:40Z', 'nvd_published_at': '2016-05-20T14:59:00Z'}
1.4.0
GHSA-rfmf-rx8w-935w
2023-07-03T21:20:17Z
2017-10-24T18:33:37Z
null
['CVE-2013-5647']
Sounder Contains Arbitrary Command Execution Vulnerability
lib/sounder/sound.rb in the sounder gem 1.0.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a filename.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sounder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5647'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamzaninovich/sounder'}, {'type': 'WEB', 'url': 'https://github.com/adamzaninovich/sounder/blob/v1.0.1/lib/sounder/sound.rb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rfmf-rx8w-935w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sounder/CVE-2013-5647.yml'}, {'type': 'WEB', 'url': 'http://vapid.dhs.org/advisories/sounder-ruby-gem-cmd-inj.html'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:35Z', 'nvd_published_at': None}
1.4.0
GHSA-3vfw-7rcp-3xgm
2023-05-12T15:20:04Z
2017-10-24T18:33:38Z
null
['CVE-2011-3187']
actionpack Improper Input Validation vulnerability
The `to_s` method in `actionpack/lib/action_dispatch/middleware/remote_ip.rb` in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2011-3187.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111209181000/http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html'}, {'type': 'WEB', 'url': 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:30Z', 'nvd_published_at': None}
1.4.0
GHSA-6jvm-3j5h-79f6
2023-01-23T20:43:16Z
2017-10-24T18:33:36Z
null
['CVE-2015-2963']
paperclip Cross-site Scripting vulnerability
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}, {'type': 'WEB', 'url': 'https://robots.thoughtbot.com/paperclip-security-release'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228084907/http://www.securityfocus.com/bid/75304'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN83881261/index.html'}, {'type': 'WEB', 'url': 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/19/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:37Z', 'nvd_published_at': None}
1.4.0
GHSA-qpjp-7rp2-9c3f
2021-09-16T20:03:05Z
2017-10-24T18:33:36Z
null
['CVE-2013-7451']
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:26Z', 'nvd_published_at': None}
1.4.0
GHSA-rvpq-5xqx-pfpp
2023-05-11T13:57:05Z
2017-10-24T18:33:38Z
null
['CVE-2006-4111']
Ruby on Rails vulnerable to code injection
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-4111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rvpq-5xqx-pfpp'}, {'type': 'WEB', 'url': 'https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2006-4111.yml'}, {'type': 'WEB', 'url': 'http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21466'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/21749'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1016673'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits'}, {'type': 'WEB', 'url': 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml'}, {'type': 'WEB', 'url': 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/19454'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2006/3237'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:02Z', 'nvd_published_at': None}
1.4.0
GHSA-q6cw-2553-7837
2023-08-29T13:38:38Z
2017-10-24T18:33:37Z
null
['CVE-2013-0284']
newrelic_rpm Gem Discloses Sensitive Information
Ruby agent 3.2.0 through 3.5.3.23 serializes sensitive data when communicating with servers operated by New Relic, which allows remote attackers to obtain sensitive information (database credentials and SQL statements) by sniffing the network and deserializing the data.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'newrelic_rpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.5.3.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.3.23'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0284'}, {'type': 'PACKAGE', 'url': 'https://github.com/newrelic/newrelic-ruby-agent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/newrelic_rpm/CVE-2013-0284.yml'}, {'type': 'WEB', 'url': 'https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20130117025417/https://newrelic.com/docs/ruby/ruby-agent-security-notification'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q1/304'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:15Z', 'nvd_published_at': None}
1.4.0
GHSA-2fqv-h3r5-m4vf
2021-08-30T21:12:50Z
2017-10-24T18:33:35Z
null
['CVE-2017-1000006']
Cross Site Scripting (XSS) in plotly.js
Affected versions of `plotly.js` are vulnerable to cross-site scripting if an attacker can convince a user to visit a malicious plot on a site using this package. ## Recommendation Update to 1.16.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'plotly.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000006'}, {'type': 'WEB', 'url': 'https://acloudtree.com/2016-08-09-how-i-hacked-plotly-by-exploiting-a-svg-vulnerability-in-plotlyjs/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2fqv-h3r5-m4vf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/145'}, {'type': 'WEB', 'url': 'http://help.plot.ly/security-advisories/2016-08-08-plotlyjs-xss-advisory/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:53Z', 'nvd_published_at': None}
1.4.0
GHSA-qqxp-xp9v-vvx6
2023-09-27T21:55:57Z
2017-10-24T18:33:37Z
null
['CVE-2012-6662']
jquery-ui Tooltip widget vulnerable to XSS
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2012-6662.yml'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8859'}, {'type': 'WEB', 'url': 'http://bugs.jqueryui.com/ticket/8861'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-0442.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1462.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/613'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/616'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:37Z', 'nvd_published_at': None}
1.4.0
GHSA-9p3v-wf2w-v29c
2021-09-08T20:12:31Z
2017-10-24T18:33:38Z
null
['CVE-2009-4214']
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4214'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9p3v-wf2w-v29c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2009-4214.yml'}, {'type': 'PACKAGE', 'url': 'http://github.com/rails/rails'}, {'type': 'WEB', 'url': 'http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/37446'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38915'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT4077'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2260'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/11/27/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2009/12/08/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/37142'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id?1023245'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2009/3352'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:07Z', 'nvd_published_at': None}
1.4.0
GHSA-78rc-8c29-p45g
2023-07-03T18:58:43Z
2017-10-24T18:33:35Z
null
['CVE-2016-2098']
actionpack allows remote code execution via application's unrestricted use of render method
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2016-2098.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/ly-IH-fxr_Q'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228015318/http://www.securityfocus.com/bid/83725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210612214217/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211205173437/https://securitytracker.com/id/1035122'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/40086/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3509'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:13Z', 'nvd_published_at': None}
1.4.0
GHSA-h6w6-xmqv-7q78
2023-05-12T17:14:49Z
2017-10-24T18:33:38Z
null
['CVE-2011-2930']
activerecord vulnerable to SQL Injection
Multiple SQL injection vulnerabilities in the `quote_table_name` method in the ActiveRecord adapters in `activerecord/lib/active_record/connection_adapters/` in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.13'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2930'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/8a39f411dc3c806422785b1f4d5c7c9d58e4bf85'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=731438'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-2930.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2301'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/17/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/19/11'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/20/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/14'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2011/08/22/5'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:17Z', 'nvd_published_at': None}
1.4.0
GHSA-jmm9-2p29-vh2w
2023-05-12T17:17:16Z
2017-10-24T18:33:38Z
null
['CVE-2011-0448']
activerecord vulnerable to SQL Injection
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/354da43ab0a10b3b7b3f9cb0619aa562c3be8474'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2011-0448.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201220214809/http://securitytracker.com/id?1025063'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:51Z', 'nvd_published_at': None}
1.4.0
GHSA-gjxw-5w2q-7grf
2023-05-26T16:50:51Z
2017-10-24T18:33:38Z
null
['CVE-2010-3933']
Rails activerecord gem has Improper Input Validation vulnerability
Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.9'}, {'fixed': '2.3.10'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3933'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2d96bccb1e8b62e3e11ca0c5d38aaa8cece889ae'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/96183e0f284bab27667e5a38fa6a1578eb029585'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2010-3933.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20101129225633/http://securitytracker.com/alerts/2010/Oct/1024624.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111225083933/http://secunia.com/advisories/41930'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208053819/http://securitytracker.com/id?1024624'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2010/10/15/security-vulnerability-in-nested-attributes-code-in-ruby-on-rails-2-3-9-and-3-0-0'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:34Z', 'nvd_published_at': None}
1.4.0
GHSA-7g65-ghrg-hpf5
2023-01-23T16:30:29Z
2017-10-24T18:33:37Z
null
['CVE-2012-3465']
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.8'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3465'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/e91e4e8bbee12ce1496bf384c04da6be296b687a'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/7fbb5392d4d282b5?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:45Z', 'nvd_published_at': None}
1.4.0
GHSA-r5hc-9xx5-97rw
2023-07-04T00:12:42Z
2017-10-24T18:33:37Z
null
['CVE-2013-4492']
i18n gem Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2015:1100'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0380'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4492'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1039435'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r5hc-9xx5-97rw'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/i18n/CVE-2013-4492.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/svenfuchs/i18n'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/pLrh6DUw998'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208125214/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/pLrh6DUw998/bLFEyIO4k_EJ'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210731082547/http://www.securityfocus.com/bid/64076'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/12/3/Rails_3_2_16_and_4_0_2_have_been_released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2830'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:45Z', 'nvd_published_at': '2013-12-07T00:55:00Z'}
1.4.0
GHSA-xwr3-fmgj-mmfr
2023-08-25T20:12:12Z
2017-10-24T18:33:36Z
null
['CVE-2013-7111']
Exposure of Sensitive Information in bio-basespace-sdk
The put_call function in the API client (`api/api_client.rb`) in the BaseSpace Ruby SDK (aka bio-basespace-sdk) gem 0.1.7 for Ruby uses the `API_KEY` on the command line, which allows remote attackers to obtain sensitive information by listing the processes.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bio-basespace-sdk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7111'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xwr3-fmgj-mmfr'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bio-basespace-sdk/CVE-2013-7111.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/14/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/12/15/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/bio-basespace-sdk.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:47Z', 'nvd_published_at': None}
1.4.0
GHSA-xgj6-pgrm-x4r2
2023-01-26T22:31:40Z
2017-10-24T18:33:38Z
null
['CVE-2007-6183']
gtk2 vulnerable to Use of Externally-Controlled Format String
Format string vulnerability in the `mdiag_initialize` function in `gtk/src/rbgtkmessagedialog.c` in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gtk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6183'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=402871'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/38757'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228174159/http://www.securityfocus.com/bid/26616'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207224244/https://www.securityfocus.com/archive/1/484240/100/0/threaded'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00214.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00251.html'}, {'type': 'WEB', 'url': 'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=453689'}, {'type': 'WEB', 'url': 'http://bugs.gentoo.org/show_bug.cgi?id=200623'}, {'type': 'WEB', 'url': 'http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-200712-09.xml'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/3407'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2007/dsa-1431'}, {'type': 'WEB', 'url': 'http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2008:033/?name=MDVSA-2008:033'}]
{'cwe_ids': ['CWE-134'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:18Z', 'nvd_published_at': None}
1.4.0
GHSA-4c4w-3q45-hp9j
2023-01-25T22:56:46Z
2017-10-24T18:33:36Z
null
['CVE-2013-7463']
Aescrypt does not sufficiently use random values
The aescrypt gem 1.0.0 for Ruby does not randomize the CBC IV for use with the AESCrypt.encrypt and AESCrypt.decrypt functions, which allows attackers to defeat cryptographic protection mechanisms via a chosen plaintext attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'aescrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7463'}, {'type': 'WEB', 'url': 'https://github.com/Gurpartap/aescrypt/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gurpartap/aescrypt'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/aescrypt/CVE-2013-7463.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227173428/http://www.securityfocus.com/bid/98035'}]
{'cwe_ids': ['CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:06Z', 'nvd_published_at': None}
1.4.0
GHSA-pchc-949f-53m5
2023-02-13T17:01:58Z
2017-10-24T18:33:37Z
null
['CVE-2013-0175']
Improper Input Validation in multi_xml
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'multi_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'}, {'type': 'WEB', 'url': 'https://github.com/sferik/multi_xml/pull/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/sferik/multi_xml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=5040457'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2013/01/11/9'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:48:50Z', 'nvd_published_at': '2013-04-25T23:55:00Z'}
1.4.0
GHSA-j96r-xvjq-r9pg
2023-01-23T17:49:35Z
2017-10-24T18:33:36Z
null
['CVE-2015-3227']
activesupport vulnerable to Denial of Service via large XML document depth
The (1) `jdom.rb` and (2) `rexml.rb` components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/bahr2JLnxvk/x4EocXnHPp8J'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228041703/http://www.securityfocus.com/bid/75234'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200517005133/http://www.securitytracker.com/id/1033755'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-07/msg00050.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2015/06/16/16'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:52Z', 'nvd_published_at': None}
1.4.0
GHSA-92w9-2pqw-rhjj
2023-01-23T16:31:49Z
2017-10-24T18:33:38Z
null
['CVE-2012-3424']
actionpack Improper Authentication vulnerability
The `decode_credentials` method in `actionpack/lib/action_controller/metal/http_authentication.rb` in Ruby on Rails before 3.0.16, 3.1.x before 3.1.7, and 3.2.x before 3.2.7 converts Digest Authentication strings to symbols, which allows remote attackers to cause a denial of service by leveraging access to an application that uses a `with_http_digest` helper method, as demonstrated by the `authenticate_or_request_with_http_digest` method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.7'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3424'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/244d32f2fa25147d?hl=en&dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2012/7/26/ann-rails-3-2-7-has-been-released/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:14Z', 'nvd_published_at': None}
1.4.0
GHSA-fhj9-cjjh-27vm
2023-03-14T22:15:51Z
2017-10-24T18:33:37Z
null
['CVE-2013-0277']
Active Record contains deserialization of arbitrary YAML
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails/tree/v6.1.4.1/activerecord'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-0277.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/cve-2013-0277'}, {'type': 'WEB', 'url': 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html'}, {'type': 'WEB', 'url': 'http://securitytracker.com/id?1028109'}, {'type': 'WEB', 'url': 'http://support.apple.com/kb/HT5784'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2013/dsa-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/02/11/6'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:43Z', 'nvd_published_at': None}
1.4.0
GHSA-g266-3crh-h7gj
2023-08-29T16:28:48Z
2017-10-24T18:33:37Z
null
['CVE-2013-1911']
ldoce Gem Arbitrary Command Execution
`lib/ldoce/word.rb` in the ldoce 0.0.2 gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in (1) an mp3 URL or (2) file name.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ldoce'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1911'}, {'type': 'WEB', 'url': 'https://github.com/markburns/ldoce/issues/1'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83163'}, {'type': 'PACKAGE', 'url': 'https://github.com/markburns/ldoce'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ldoce/CVE-2013-1911.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229102422/http://www.securityfocus.com/bid/58783'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-04/0010.html'}, {'type': 'WEB', 'url': 'http://otiose.dhs.org/advisories/ldoce-0.0.2-cmd-exec.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/31/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58783'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:53Z', 'nvd_published_at': None}
1.4.0
GHSA-m46p-ggm5-5j83
2023-07-05T20:33:59Z
2017-10-24T18:33:36Z
null
['CVE-2014-0081']
Rails vulnerable to Cross-site Scripting
There is an XSS vulnerability in the `number_to_currency`, `number_to_percentage` and `number_to_human` helpers in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2014-0081. Versions Affected: All. Fixed Versions: 4.1.0.beta2, 4.0.3, 3.2.17. Impact ------ These helpers allows users to nicely format a numeric value. Some of the parameters to the helper (format, negative_format and units) are not escaped correctly. Applications which pass user controlled data as one of these parameters are vulnerable to an XSS attack. All users passing user controlled data to these parameters of the number helpers should either upgrade or use one of the workarounds immediately. Releases -------- The 4.1.0.rc1, 4.0.3 and 3.2.17 releases are available at the normal locations. Workarounds ----------- The workaround for this issue is to escape the value passed to the parameter. For example, replace code like this: ```ruby <%= number_to_currency(1.02, format: params[:format]) %> ``` With code like this ```ruby <%= number_to_currency(1.02, format: h(params[:format])) %> ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 4-1-beta-number_helpers_xss.patch - Patch for 4.1-beta series * 4-0-number_helpers_xss.patch - Patch for 4.0 series * 3-2-number_helpers_xss.patch - Patch for 3.2 series Please note that only the 4.0.x and 3.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Kevin Reintjes for reporting the issue to us. -- Aaron Patterson http://tenderlovemaking.com/
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.17'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/08d0a11a3f62718d601d39e617c834759cf59bbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails/CVE-2014-0081.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140911141416/http://www.securitytracker.com/id/1029782'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170307202606/http://www.securityfocus.com/bid/65647'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207045136/https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/02/18/8'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0215.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:48Z', 'nvd_published_at': None}
1.4.0
GHSA-84fq-6626-w5fg
2020-08-31T18:07:28Z
2017-10-24T18:33:36Z
null
['CVE-2014-7193']
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user. A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all. ## Recommendation Update to version 3.0.0 or greater.
[]
[{'package': {'ecosystem': 'npm', 'name': 'crumb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7193'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'WEB', 'url': 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-84fq-6626-w5fg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/4'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:14Z', 'nvd_published_at': '2014-12-25T11:59:00Z'}
1.4.0
GHSA-6c8p-qphv-668v
2023-06-09T20:18:48Z
2017-10-24T18:33:37Z
null
['CVE-2013-1812']
Denial of service in ruby-openid
The ruby-openid gem before 2.2.2 for Ruby allows remote OpenID providers to cause a denial of service (CPU consumption) via (1) a large XRDS document or (2) an XML Entity Expansion (XEE) attack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1812'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/pull/43'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/a3693cef06049563f5b4e4824f4d3211288508ed'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=918134'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6c8p-qphv-668v'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/ruby-openid'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-openid/CVE-2013-1812.yml'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120204.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120361.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/03/8'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:51Z', 'nvd_published_at': None}
1.4.0
GHSA-v9v4-7jp6-8c73
2023-04-20T21:47:18Z
2017-10-24T18:33:38Z
null
['CVE-2011-2197']
rails Cross-site Scripting vulnerability
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.12'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.3.11'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2197'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/53a2c0baf2b128dd4808eca313256f6f4bb8c4cd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/ed3796434af6069ced6a641293cf88eef3b284da'}, {'type': 'WEB', 'url': 'https://gist.github.com/NZKoz/b2ceb626fc2bcdfe497f'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activesupport/CVE-2011-2197.yml'}, {'type': 'WEB', 'url': 'http://groups.google.com/group/rubyonrails-security/msg/663b600d4471e0d4?dmode=source&output=gplain'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062514.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2011-June/062090.html'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/09/2'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2011/06/13/9'}, {'type': 'WEB', 'url': 'http://weblog.rubyonrails.org/2011/6/8/potential-xss-vulnerability-in-ruby-on-rails-applications'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:17Z', 'nvd_published_at': None}
1.4.0
GHSA-fmr4-7g9q-7hc7
2020-06-17T16:30:43Z
2017-10-24T18:33:36Z
null
[]
Moderate severity vulnerability that affects handlebars
**Withdrawn:** Duplicate of GHSA-9prh-257w-9277
[]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8861'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fmr4-7g9q-7hc7'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:43Z', 'nvd_published_at': None}
1.4.0
GHSA-vm28-mrm7-fpjq
2023-08-28T16:26:10Z
2017-10-24T18:33:36Z
null
['CVE-2014-2888']
sfpagent Command Injection vulnerability
`lib/sfpagent/bsig.rb` in the sfpagent gem before 0.4.15 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the module name in a JSON request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sfpagent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/herry13/sfpagent'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sfpagent/CVE-2014-2888.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201029141944/http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2014/Apr/243'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/16/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/04/18/4'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/spfagent-remotecmd.html'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:58Z', 'nvd_published_at': '2014-04-23T15:55:00Z'}
1.4.0
GHSA-xrr6-3pc4-m447
2023-08-25T23:37:47Z
2017-10-24T18:33:36Z
null
['CVE-2015-7577']
Active Record Improper Access Control
`activerecord/lib/active_record/nested_attributes.rb` in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.beta1'}, {'fixed': '5.0.0.beta1.1'}]}], 'versions': ['5.0.0.beta1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2015-7577.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/cawsWcQ6c8g'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2016-0296.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2016/dsa-3464'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/01/25/10'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:28Z', 'nvd_published_at': None}
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
31
Edit dataset card