| 0 |
| url |
VCID-12x8-jxdf-jqdz |
| vulnerability_id |
VCID-12x8-jxdf-jqdz |
| summary |
Actionpack Open Redirect Vulnerability
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22881 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94619 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94665 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94656 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94652 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94648 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94644 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94626 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94634 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.15453 |
| scoring_system |
epss |
| scoring_elements |
0.94632 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22881 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22881, GHSA-8877-prq4-9xfw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-12x8-jxdf-jqdz |
|
| 1 |
| url |
VCID-19fr-55kr-hyax |
| vulnerability_id |
VCID-19fr-55kr-hyax |
| summary |
rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements
NOTE: rails-ujs is part of Rails/actionview since 5.1.0.
There is a potential DOM based cross-site scripting issue in rails-ujs
which leverages the Clipboard API to target HTML elements that are
assigned the contenteditable attribute. This has the potential to
occur when pasting malicious HTML content from the clipboard that
includes a data-method, data-remote or data-disable-with attribute.
This vulnerability has been assigned the CVE identifier CVE-2023-23913.
Not affected: < 5.1.0
Versions Affected: >= 5.1.0
Fixed Versions: 6.1.7.3, 7.0.4.3
Impact
If the specified malicious HTML clipboard content is provided to a
contenteditable element, this could result in the arbitrary execution
of javascript on the origin in question.
Releases
The FIXED releases are available at the normal locations.
Workarounds
We recommend that all users upgrade to one of the FIXED versions.
In the meantime, users can attempt to mitigate this vulnerability
by removing the contenteditable attribute from elements in pages
that rails-ujs will interact with.
Patches
To aid users who aren’t able to upgrade immediately we have provided
patches for the two supported release series. They are in git-am
format and consist of a single changeset.
* rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series
* rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series
Please note that only the 7.0.Z and 6.1.Z series are
supported at present, and 6.0.Z for severe vulnerabilities.
Users of earlier unsupported releases are advised to upgrade as
soon as possible as we cannot guarantee the continued availability
of security fixes for unsupported releases.
Credits
We would like to thank ryotak 15 for reporting this!
* rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB)
* rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB)
* rails-ujs-data-method-contenteditable-main.patch (8.9 KB) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23913 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30269 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.3023 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.3017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30226 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35905 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23913 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-23913, GHSA-xp5h-f8jf-rc8q
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-19fr-55kr-hyax |
|
| 2 |
| url |
VCID-1bxs-yghe-cyck |
| vulnerability_id |
VCID-1bxs-yghe-cyck |
| summary |
URL Redirection to Untrusted Site ('Open Redirect')
A possible open redirect vulnerability in the Host Authorization middleware in Action Pack >= 6.0.0 that could allow attackers to redirect users to a malicious website. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22942 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67302 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67378 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67412 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67403 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.6739 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67361 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22942 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22942, GHSA-2rqw-v265-jf8c
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1bxs-yghe-cyck |
|
| 3 |
| url |
VCID-1rxp-g9rz-4yb3 |
| vulnerability_id |
VCID-1rxp-g9rz-4yb3 |
| summary |
Possible XSS Security Vulnerability in SafeBuffer#bytesplice
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
This vulnerability has been assigned the CVE identifier CVE-2023-28120.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3
# Impact
ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized.
When these strings are mutated, the tag is should be removed to mark them as no longer being html_safe.
Ruby 3.2 introduced a new bytesplice method which ActiveSupport does not yet understand to be a mutation.
Users on older versions of Ruby are likely unaffected.
All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately.
# Workarounds
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60419 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60411 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60382 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60403 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60317 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60349 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60323 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60389 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28120 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-28120, GHSA-pj73-v5mw-pm9j, GMS-2023-765
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1rxp-g9rz-4yb3 |
|
| 4 |
| url |
VCID-1x8k-t8mr-3fgp |
| vulnerability_id |
VCID-1x8k-t8mr-3fgp |
| summary |
URL Redirection to Untrusted Site ('Open Redirect')
A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44528 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96193 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96188 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.9618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96175 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.9615 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96142 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96171 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96161 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.25125 |
| scoring_system |
epss |
| scoring_elements |
0.96158 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-44528 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-44528, GHSA-qphc-hf5q-v8fc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1x8k-t8mr-3fgp |
|
| 5 |
| url |
VCID-31xv-z8c6-a7bg |
| vulnerability_id |
VCID-31xv-z8c6-a7bg |
| summary |
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks.
### Impact
When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples:
```erb
<%# The welcome_html translation is not defined for the current locale: %>
<%= t("welcome_html", default: untrusted_user_controlled_string) %>
<%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %>
<%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %>
```
### Patches
Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations.
The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest.
To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series
* [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series
Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases.
### Workarounds
Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`):
```erb
<%= t("welcome_html", default: h(untrusted_user_controlled_string)) %>
``` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81155 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81153 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81123 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81136 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81112 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81085 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81061 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01497 |
| scoring_system |
epss |
| scoring_elements |
0.81052 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-15169, GHSA-cfjv-5498-mph5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-31xv-z8c6-a7bg |
|
| 6 |
| url |
VCID-3hur-esmy-x3hr |
| vulnerability_id |
VCID-3hur-esmy-x3hr |
| summary |
Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text
There is a possible ReDoS vulnerability in the plain_text_for_blockquote_node helper in Action Text. This vulnerability has been assigned the CVE identifier CVE-2024-47888.
Impact
------
Carefully crafted text can cause the plain_text_for_blockquote_node helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users can avoid calling `plain_text_for_blockquote_node` or upgrade to Ruby 3.2
Credits
-------
Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66734 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66687 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66717 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.6673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.6671 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66646 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66695 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00517 |
| scoring_system |
epss |
| scoring_elements |
0.66672 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47888 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47888, GHSA-wwhv-wxv9-rpgw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3hur-esmy-x3hr |
|
| 7 |
| url |
VCID-5qu2-b8gt-7qe3 |
| vulnerability_id |
VCID-5qu2-b8gt-7qe3 |
| summary |
Active Record subject to Regular Expression Denial-of-Service (ReDoS)
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22880 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85168 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85221 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02459 |
| scoring_system |
epss |
| scoring_elements |
0.85179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.02599 |
| scoring_system |
epss |
| scoring_elements |
0.85636 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.02599 |
| scoring_system |
epss |
| scoring_elements |
0.85616 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02599 |
| scoring_system |
epss |
| scoring_elements |
0.85612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02599 |
| scoring_system |
epss |
| scoring_elements |
0.85608 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02599 |
| scoring_system |
epss |
| scoring_elements |
0.85631 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22880 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22880, GHSA-8hc4-xxm3-5ppp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5qu2-b8gt-7qe3 |
|
| 8 |
| url |
VCID-63gy-6njy-kbd8 |
| vulnerability_id |
VCID-63gy-6njy-kbd8 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85734 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85729 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85707 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85711 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85701 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85663 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.8567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85689 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-22792, GHSA-p84v-45xj-wwqj, GMS-2023-58
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63gy-6njy-kbd8 |
|
| 9 |
| url |
VCID-6ku5-mtgz-zygw |
| vulnerability_id |
VCID-6ku5-mtgz-zygw |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.825 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82406 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82424 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.8242 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82448 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82454 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82468 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01733 |
| scoring_system |
epss |
| scoring_elements |
0.82463 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22796 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-22796, GHSA-j6gc-792m-qgm2, GMS-2023-61
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ku5-mtgz-zygw |
|
| 10 |
| url |
VCID-6pxd-xsaw-tuer |
| vulnerability_id |
VCID-6pxd-xsaw-tuer |
| summary |
Active Support Possibly Discloses Locally Encrypted Files
There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037.
Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38037 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.2281 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22954 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22747 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22876 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22896 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22859 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22803 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00076 |
| scoring_system |
epss |
| scoring_elements |
0.22816 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38037 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38037, GHSA-cr5q-6q9f-rq6q
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6pxd-xsaw-tuer |
|
| 11 |
| url |
VCID-895a-ydc5-zfg6 |
| vulnerability_id |
VCID-895a-ydc5-zfg6 |
| summary |
Circumvention of file size limits in ActiveStorage
There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user.
Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1
Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81448 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81449 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81356 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81405 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81431 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01549 |
| scoring_system |
epss |
| scoring_elements |
0.81411 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8162 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8162, GHSA-m42x-37p3-fv5w
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-895a-ydc5-zfg6 |
|
| 12 |
| url |
VCID-a6sp-18av-wya6 |
| vulnerability_id |
VCID-a6sp-18av-wya6 |
| summary |
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails <= 6.0.3
Not affected: rails < 5.0.0
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Applications that use this return value may be
inadvertently use untrusted user input.
Impacted code will look something like this:
```
def update
# Attacker has included the parameter: `{ is_admin: true }`
User.update(clean_up_params)
end
def clean_up_params
params.each { |k, v| SomeModel.check(v) if k == :name }
end
```
Note the mistaken use of `each` in the `clean_up_params` method in the above
example.
Workarounds
-----------
Do not use the return values of `each`, `each_value`, or `each_pair` in your
application. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91745 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.9169 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91698 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91703 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91712 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91724 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91734 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91736 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.07389 |
| scoring_system |
epss |
| scoring_elements |
0.91752 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8164 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8164, GHSA-8727-m6gj-mc37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sp-18av-wya6 |
|
| 13 |
| url |
VCID-ce39-j83r-6ug9 |
| vulnerability_id |
VCID-ce39-j83r-6ug9 |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22577 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52204 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52201 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52175 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52141 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52145 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52099 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52126 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22577 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2022-22577, GHSA-mm33-5vfq-3mm3, GMS-2022-1137
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ce39-j83r-6ug9 |
|
| 14 |
| url |
VCID-dd9p-x7k3-37ea |
| vulnerability_id |
VCID-dd9p-x7k3-37ea |
| summary |
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45215 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45164 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45162 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45173 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.4512 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45177 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28362, GHSA-4g8v-vg43-wpgf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dd9p-x7k3-37ea |
|
| 15 |
| url |
VCID-drg6-gj1f-h7ea |
| vulnerability_id |
VCID-drg6-gj1f-h7ea |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21831 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80616 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80614 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80585 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80592 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80606 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80579 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.8055 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80559 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0142 |
| scoring_system |
epss |
| scoring_elements |
0.80537 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21831 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2022-21831, GHSA-w749-p3v6-hccq, GMS-2022-301
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drg6-gj1f-h7ea |
|
| 16 |
| url |
VCID-es1t-7196-4kbb |
| vulnerability_id |
VCID-es1t-7196-4kbb |
| summary |
CSRF Vulnerability in rails-ujs
There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains.
Versions Affected: rails <= 6.0.3
Not affected: Applications which don't use rails-ujs.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
This is a regression of CVE-2015-1840.
In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent.
Workarounds
-----------
To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters.
For example, code like this:
link_to params
to code like this:
link_to filtered_params
def filtered_params
# Filter just the parameters that you trust
end |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.6929 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69281 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69242 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69177 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69245 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69195 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69213 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69192 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69285 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00592 |
| scoring_system |
epss |
| scoring_elements |
0.69263 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8167 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8167, GHSA-xq5j-gw7f-jgj8
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-es1t-7196-4kbb |
|
| 17 |
| url |
VCID-g3rk-djae-pkeh |
| vulnerability_id |
VCID-g3rk-djae-pkeh |
| summary |
Possible Content Security Policy bypass in Action Dispatch
There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack.
Impact
------
Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.
Credits
-------
Thanks to [ryotak](https://hackerone.com/ryotak) for the report! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40865 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40883 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.4089 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40852 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40895 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-54133, GHSA-vfm5-rmrh-j26v
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g3rk-djae-pkeh |
|
| 18 |
| url |
VCID-gjey-bqtd-kqa1 |
| vulnerability_id |
VCID-gjey-bqtd-kqa1 |
| summary |
Action Pack contains Information Disclosure / Unintended Method Execution vulnerability
Impact
------
There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input.
Vulnerable code will look like this.
```
redirect_to(params[:some_param])
```
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
--------
The FIXED releases are available at the normal locations.
Workarounds
-----------
To work around this problem, it is recommended to use an allow list for valid parameters passed from the user. For example,
```ruby
private def check(param)
case param
when "valid"
param
else
"/"
end
end
def index
redirect_to(check(params[:some_param]))
end
```
Or force the user input to be cast to a string like this,
```ruby
def index
redirect_to(params[:some_param].to_s)
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 5-2-information-disclosure.patch - Patch for 5.2 series
* 6-0-information-disclosure.patch - Patch for 6.0 series
* 6-1-information-disclosure.patch - Patch for 6.1 series
Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thanks to Benoit Côté-Jodoin from Shopify for reporting this. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22885 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86797 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86817 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86736 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86812 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86746 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86765 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86763 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86783 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86791 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86805 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.03096 |
| scoring_system |
epss |
| scoring_elements |
0.86802 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22885 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22885, GHSA-hjg4-8q5f-x6fm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gjey-bqtd-kqa1 |
|
| 19 |
| url |
VCID-hppf-a715-r7b2 |
| vulnerability_id |
VCID-hppf-a715-r7b2 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81305 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81303 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81266 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.8121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81234 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81288 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-22795, GHSA-8xww-x3g3-6jcv, GMS-2023-56
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hppf-a715-r7b2 |
|
| 20 |
| url |
VCID-jwun-grgg-2uet |
| vulnerability_id |
VCID-jwun-grgg-2uet |
| summary |
Exposure of information in Action Pack
Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests. This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23633 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.5868 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58685 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58667 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58687 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58669 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58662 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.5861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58643 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00367 |
| scoring_system |
epss |
| scoring_elements |
0.58623 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23633 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23634 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63277 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63269 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.63267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.6327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00441 |
| scoring_system |
epss |
| scoring_elements |
0.6325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63763 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00453 |
| scoring_system |
epss |
| scoring_elements |
0.63789 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-23634 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2022-23633, CVE-2022-23634, GHSA-rmj8-8hhh-gv5h, GHSA-wh98-p28r-vrc9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jwun-grgg-2uet |
|
| 21 |
| url |
VCID-mnkw-23eu-bkgc |
| vulnerability_id |
VCID-mnkw-23eu-bkgc |
| summary |
Ability to forge per-form CSRF tokens in Rails
It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
Impact
------
Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
Workarounds
-----------
This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63353 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63311 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63348 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63364 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63278 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63312 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63284 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00443 |
| scoring_system |
epss |
| scoring_elements |
0.63225 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8166 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8166, GHSA-jp5v-5gx4-jmj9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mnkw-23eu-bkgc |
|
| 22 |
| url |
VCID-p5mc-r1rg-5ff7 |
| vulnerability_id |
VCID-p5mc-r1rg-5ff7 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in actionview. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27777 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75768 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75864 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75823 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75829 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75848 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75824 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75812 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27777 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2022-27777, GHSA-ch3h-j2vf-95pv, GMS-2022-1138
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5mc-r1rg-5ff7 |
|
| 23 |
| url |
VCID-sfyc-jewr-wuf5 |
| vulnerability_id |
VCID-sfyc-jewr-wuf5 |
| summary |
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887.
Impact
------
For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for reporting |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52976 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5297 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52901 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47887, GHSA-vfg9-r3fq-jvx4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyc-jewr-wuf5 |
|
| 24 |
| url |
VCID-sgdb-985e-4uej |
| vulnerability_id |
VCID-sgdb-985e-4uej |
| summary |
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.
Impact
------
Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://access.redhat.com/security/cve/cve-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://access.redhat.com/security/cve/cve-2024-41128 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69647 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69608 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69657 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69632 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
|
| 3 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/rails/rails |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rails/rails |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-41128, GHSA-x76w-6vjr-8xgj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sgdb-985e-4uej |
|
| 25 |
| url |
VCID-sygb-mygd-s3gb |
| vulnerability_id |
VCID-sygb-mygd-s3gb |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-44566 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.8515 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85129 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85132 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85134 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.8512 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85113 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.8507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02421 |
| scoring_system |
epss |
| scoring_elements |
0.85087 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-44566 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-44566, GHSA-579w-22j4-4749, GMS-2023-59
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sygb-mygd-s3gb |
|
| 26 |
| url |
VCID-t684-yp58-hkg8 |
| vulnerability_id |
VCID-t684-yp58-hkg8 |
| summary |
ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore
In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when
untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result
from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like:
```
data = cache.fetch("demo", raw: true) { untrusted_string }
```
Versions Affected: rails < 5.2.5, rails < 6.0.4
Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input.
Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1
Impact
------
Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum,
this vulnerability allows an attacker to inject untrusted Ruby objects into a web application.
In addition to upgrading to the latest versions of Rails, developers should ensure that whenever
they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both
reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes,
detect if data was serialized using the raw option upon deserialization.
Workarounds
-----------
It is recommended that application developers apply the suggested patch or upgrade to the latest release as
soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using
the `raw` argument should be double-checked to ensure that they conform to the expected format. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8165 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99588 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.9959 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99584 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99589 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99585 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99586 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.90128 |
| scoring_system |
epss |
| scoring_elements |
0.99587 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8165 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8165, GHSA-2p68-f74v-9wc6
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t684-yp58-hkg8 |
|
| 27 |
| url |
VCID-t9yh-ss8z-e3cb |
| vulnerability_id |
VCID-t9yh-ss8z-e3cb |
| summary |
Duplicate
This advisory duplicates another. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22794 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91239 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.9124 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.9117 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91186 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91179 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.91206 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.06659 |
| scoring_system |
epss |
| scoring_elements |
0.912 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22794 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2023-22794, GHSA-hq7p-j377-6v63, GMS-2023-60
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9yh-ss8z-e3cb |
|
| 28 |
| url |
VCID-v9mt-t1pb-hybk |
| vulnerability_id |
VCID-v9mt-t1pb-hybk |
| summary |
Cross site scripting vulnerability in ActionView
There is a possible cross site scripting (XSS) vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
### Impact
There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for escaping JavaScript string literals. Impacted code will look something like this:
```erb
<script>let a = `<%= j unknown_input %>`</script>
```
or
```erb
<script>let a = `<%= escape_javascript unknown_input %>`</script>
```
### Releases
The 6.0.2.2 and 5.2.4.2 releases are available at the normal locations.
### Workarounds
For those that can't upgrade, the following monkey patch may be used:
```ruby
ActionView::Helpers::JavaScriptHelper::JS_ESCAPE_MAP.merge!(
{
"`" => "\\`",
"$" => "\\$"
}
)
module ActionView::Helpers::JavaScriptHelper
alias :old_ej :escape_javascript
alias :old_j :j
def escape_javascript(javascript)
javascript = javascript.to_s
if javascript.empty?
result = ""
else
result = javascript.gsub(/(\\|<\/|\r\n|\342\200\250|\342\200\251|[\n\r"']|[`]|[$])/u, JS_ESCAPE_MAP)
end
javascript.html_safe? ? result.html_safe : result
end
alias :j :escape_javascript
end
```
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* [5-2-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-5-2-js-helper-xss-patch) - Patch for 5.2 series
* [6-0-js-helper-xss.patch](https://gist.github.com/tenderlove/c042ff49f0347c37e99183a6502accc6#file-6-0-js-helper-xss-patch) - Patch for 6.0 series
Please note that only the 5.2 and 6.0 series are supported at present. Users
of earlier unsupported releases are advised to upgrade as soon as possible as we
cannot guarantee the continued availability of security fixes for unsupported
releases.
### Credits
Thanks to Jesse Campos from Chef Secure |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75509 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75406 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75441 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75422 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75493 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00887 |
| scoring_system |
epss |
| scoring_elements |
0.75504 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-5267 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5267 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-5267 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-5267, GHSA-65cv-r6x7-79hv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9mt-t1pb-hybk |
|
| 29 |
| url |
VCID-wg3a-j2dp-ayh4 |
| vulnerability_id |
VCID-wg3a-j2dp-ayh4 |
| summary |
Possible DoS Vulnerability in Action Controller Token Authentication
There is a possible DoS vulnerability in the Token Authentication logic in Action Controller.
Versions Affected: >= 4.0.0
Not affected: < 4.0.0
Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6
Impact
------
Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this:
```
class PostsController < ApplicationController
before_action :authenticate
private
def authenticate
authenticate_or_request_with_http_token do |token, options|
# ...
end
end
end
```
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around the issue:
```ruby
module ActionController::HttpAuthentication::Token
AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 5-2-http-authentication-dos.patch - Patch for 5.2 series
* 6-0-http-authentication-dos.patch - Patch for 6.0 series
* 6-1-http-authentication-dos.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22904 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92019 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92022 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92007 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92004 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.92 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91987 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91966 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.07856 |
| scoring_system |
epss |
| scoring_elements |
0.91974 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22904 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22904, GHSA-7wjx-3g7j-8584
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wg3a-j2dp-ayh4 |
|
| 30 |
| url |
VCID-wyy6-h8bq-vyde |
| vulnerability_id |
VCID-wyy6-h8bq-vyde |
| summary |
Denial of Service in Action Dispatch
Impact
------
There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
The following monkey patch placed in an initializer can be used to work around the issue.
```ruby
module Mime
class Type
MIME_REGEXP = /\A(?:\*\/\*|#{MIME_NAME}\/(?:\*|#{MIME_NAME})(?>\s*#{MIME_PARAMETER}\s*)*)\z/
end
end
```
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset.
* 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.0 series
* 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.
Credits
-------
Thanks to Security Curious <security...@pm.me> for reporting this! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22902 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77699 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77701 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77681 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77649 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77605 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77612 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01063 |
| scoring_system |
epss |
| scoring_elements |
0.77639 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22902 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2021-22902, GHSA-g8ww-46x2-2p65
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wyy6-h8bq-vyde |
|
| 31 |
| url |
VCID-yy6t-ybeu-qycc |
| vulnerability_id |
VCID-yy6t-ybeu-qycc |
| summary |
Possible ReDoS vulnerability in block_format in Action Mailer
There is a possible ReDoS vulnerability in the block_format helper in Action Mailer. This vulnerability has been assigned the CVE identifier CVE-2024-47889.
Impact
------
Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users can avoid calling the `block_format` helper or upgrade to Ruby 3.2
Credits
-------
Thanks to yuki_osaki for the report! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47889 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57094 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5709 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57111 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57099 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57097 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57047 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57046 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57069 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47889 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47889, GHSA-h47h-mwp9-c6q6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yy6t-ybeu-qycc |
|
| 32 |
| url |
VCID-yzpx-3gam-y3bu |
| vulnerability_id |
VCID-yzpx-3gam-y3bu |
| summary |
Active Storage allowed transformation methods that were potentially unsafe
Active Storage attempts to prevent the use of potentially unsafe image transformation methods and parameters by default.
The default allowed list contains three methods allowing for the circumvention of the safe defaults which enables potential command injection vulnerabilities in cases where arbitrary user supplied input is accepted as valid transformation methods or parameters.
This has been assigned the CVE identifier CVE-2025-24293.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.1.5.2, 7.2.2.2, 8.0.2.1
Impact
------
This vulnerability impacts applications that use Active Storage with the image_processing processing gem in addition to mini_magick as the image processor.
Vulnerable code will look something similar to this:
```
<%= image_tag blob.variant(params[:t] => params[:v]) %>
```
Where the transformation method or its arguments are untrusted arbitrary input.
All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Consuming user supplied input for image transformation methods or their parameters is unsupported behavior and should be considered dangerous.
Strict validation of user supplied methods and parameters should be performed as well as having a strong [ImageMagick security policy](https://imagemagick.org/script/security-policy.php) deployed.
Credits
-------
Thank you [lio346](https://hackerone.com/lio346) from Unit 515 of OPSWAT for reporting this! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24293 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.42056 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.42119 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.002 |
| scoring_system |
epss |
| scoring_elements |
0.42091 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43327 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43351 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43361 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43301 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43316 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43347 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43312 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-24293 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/advisories/GHSA-r4mg-4433-c7g3 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
CRITICAL |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
9.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-02T14:45:32Z/ |
|
|
| url |
https://github.com/advisories/GHSA-r4mg-4433-c7g3 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-24293, GHSA-r4mg-4433-c7g3
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yzpx-3gam-y3bu |
|
| 33 |
| url |
VCID-zqzx-avvt-wkhm |
| vulnerability_id |
VCID-zqzx-avvt-wkhm |
| summary |
Active Record logging vulnerable to ANSI escape injection
This vulnerability has been assigned the CVE identifier CVE-2025-55193
### Impact
The ID passed to `find` or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences.
### Releases
The fixed releases are available at the normal locations.
### Credits
Thanks to [lio346](https://hackerone.com/lio346) from Unit 515 of OPSWAT for reporting this vulnerability |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55193 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33396 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33363 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33317 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33444 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.3337 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33335 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.33358 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00136 |
| scoring_system |
epss |
| scoring_elements |
0.334 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00148 |
| scoring_system |
epss |
| scoring_elements |
0.35258 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-55193 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-55193, GHSA-76r7-hhxj-r776
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zqzx-avvt-wkhm |
|
| 34 |
| url |
VCID-zy7d-3db6-sydw |
| vulnerability_id |
VCID-zy7d-3db6-sydw |
| summary |
Cross-site scripting in actionpack
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
Workarounds
-----------
Until such time as the patch can be applied, application developers should disable the Actionable Exceptions middleware in their development environment via a line such as this one in their config/environment/development.rb: `config.middleware.delete ActionDispatch::ActionableExceptions` |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8264 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5721 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57206 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57159 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5716 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57065 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57225 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57213 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57211 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8264 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| purl |
pkg:deb/debian/rails@2:6.0.3.7%2Bdfsg-2%2Bdeb11u2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3hur-esmy-x3hr |
|
| 1 |
| vulnerability |
VCID-4tzv-1t1b-t3g3 |
|
| 2 |
| vulnerability |
VCID-5tky-d2en-u7c7 |
|
| 3 |
| vulnerability |
VCID-6pxd-xsaw-tuer |
|
| 4 |
| vulnerability |
VCID-96qr-hdbp-p7ff |
|
| 5 |
| vulnerability |
VCID-a6z9-5n6k-2kak |
|
| 6 |
| vulnerability |
VCID-ad6q-vtdf-syb6 |
|
| 7 |
| vulnerability |
VCID-dd9p-x7k3-37ea |
|
| 8 |
| vulnerability |
VCID-g3rk-djae-pkeh |
|
| 9 |
| vulnerability |
VCID-hatd-vkun-13hj |
|
| 10 |
| vulnerability |
VCID-n8r7-wthv-fqaj |
|
| 11 |
| vulnerability |
VCID-qxe4-dubt-1kfp |
|
| 12 |
| vulnerability |
VCID-sarm-n22v-akcm |
|
| 13 |
| vulnerability |
VCID-sfyc-jewr-wuf5 |
|
| 14 |
| vulnerability |
VCID-sgdb-985e-4uej |
|
| 15 |
| vulnerability |
VCID-sygb-mygd-s3gb |
|
| 16 |
| vulnerability |
VCID-wpmk-wgpm-cuee |
|
| 17 |
| vulnerability |
VCID-yy6t-ybeu-qycc |
|
| 18 |
| vulnerability |
VCID-yzpx-3gam-y3bu |
|
| 19 |
| vulnerability |
VCID-zqzx-avvt-wkhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/rails@2:6.0.3.7%252Bdfsg-2%252Bdeb11u2 |
|
|
| aliases |
CVE-2020-8264, GHSA-35mm-cc6r-8fjp
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zy7d-3db6-sydw |
|