| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-5bh7-drnb-7ygg |
| vulnerability_id |
VCID-5bh7-drnb-7ygg |
| summary |
Rails has possible XSS Vulnerability in Action Controller
# Possible XSS Vulnerability in Action Controller
There is a possible XSS vulnerability when using the translation helpers
(`translate`, `t`, etc) in Action Controller. This vulnerability has been
assigned the CVE identifier CVE-2024-26143.
Versions Affected: >= 7.0.0.
Not affected: < 7.0.0
Fixed Versions: 7.1.3.1, 7.0.8.1
Impact
------
Applications using translation methods like `translate`, or `t` on a
controller, with a key ending in "_html", a `:default` key which contains
untrusted user input, and the resulting string is used in a view, may be
susceptible to an XSS vulnerability.
For example, impacted code will look something like this:
```ruby
class ArticlesController < ApplicationController
def show
@message = t("message_html", default: untrusted_input)
# The `show` template displays the contents of `@message`
end
end
```
To reiterate the pre-conditions, applications must:
* Use a translation function from a controller (i.e. _not_ I18n.t, or `t` from
a view)
* Use a key that ends in `_html`
* Use a default value where the default value is untrusted and unescaped input
* Send the text to the victim (whether that's part of a template, or a
`render` call)
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 7-0-translate-xss.patch - Patch for 7.0 series
* 7-1-translate-xss.patch - Patch for 7.1 series
Credits
-------
Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the patch and fix! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83957 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83933 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83937 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83944 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83927 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83898 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.83896 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.02067 |
| scoring_system |
epss |
| scoring_elements |
0.8388 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26143 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26143, GHSA-9822-6m93-xqf4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5bh7-drnb-7ygg |
|
| 1 |
| url |
VCID-63gy-6njy-kbd8 |
| vulnerability_id |
VCID-63gy-6njy-kbd8 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85734 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85729 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85707 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85711 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85701 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85663 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.8567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02639 |
| scoring_system |
epss |
| scoring_elements |
0.85689 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22792 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22792, GHSA-p84v-45xj-wwqj, GMS-2023-58
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-63gy-6njy-kbd8 |
|
| 2 |
| url |
VCID-dd9p-x7k3-37ea |
| vulnerability_id |
VCID-dd9p-x7k3-37ea |
| summary |
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362.
Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45215 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45164 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45162 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45194 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45174 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45173 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.4512 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00224 |
| scoring_system |
epss |
| scoring_elements |
0.45177 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28362 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28362, GHSA-4g8v-vg43-wpgf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dd9p-x7k3-37ea |
|
| 3 |
| url |
VCID-ehbj-aezy-d7h4 |
| vulnerability_id |
VCID-ehbj-aezy-d7h4 |
| summary |
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch
# Possible ReDoS vulnerability in Accept header parsing in Action Dispatch
There is a possible ReDoS vulnerability in the Accept header parsing routines
of Action Dispatch. This vulnerability has been assigned the CVE identifier
CVE-2024-26142.
Versions Affected: >= 7.1.0, < 7.1.3.1
Not affected: < 7.1.0
Fixed Versions: 7.1.3.1
Impact
------
Carefully crafted Accept headers can cause Accept header parsing in Action
Dispatch to take an unexpected amount of time, possibly resulting in a DoS
vulnerability. All users running an affected release should either upgrade or
use one of the workarounds immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby
3.2 or newer are unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 7-1-accept-redox.patch - Patch for 7.1 series
Credits
-------
Thanks [svalkanov](https://hackerone.com/svalkanov) for the report and patch! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87692 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87677 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87645 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.8768 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87685 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87632 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87674 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87647 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.03542 |
| scoring_system |
epss |
| scoring_elements |
0.87667 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26142 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26142, GHSA-jjhx-jhvp-74wq
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ehbj-aezy-d7h4 |
|
| 4 |
| url |
VCID-g3rk-djae-pkeh |
| vulnerability_id |
VCID-g3rk-djae-pkeh |
| summary |
Possible Content Security Policy bypass in Action Dispatch
There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack.
Impact
------
Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.
Credits
-------
Thanks to [ryotak](https://hackerone.com/ryotak) for the report! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31466 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00122 |
| scoring_system |
epss |
| scoring_elements |
0.31424 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40865 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40883 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.4089 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40852 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40895 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-54133 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-54133, GHSA-vfm5-rmrh-j26v
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g3rk-djae-pkeh |
|
| 5 |
| url |
VCID-hppf-a715-r7b2 |
| vulnerability_id |
VCID-hppf-a715-r7b2 |
| summary |
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81305 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81303 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81266 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.8121 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81234 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01523 |
| scoring_system |
epss |
| scoring_elements |
0.81288 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22795, GHSA-8xww-x3g3-6jcv, GMS-2023-56
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hppf-a715-r7b2 |
|
| 6 |
| url |
VCID-p22r-u1dd-b7b3 |
| vulnerability_id |
VCID-p22r-u1dd-b7b3 |
| summary |
Missing security headers in Action Pack on non-HTML responses
# Permissions-Policy is Only Served on HTML Content-Type
The application configurable Permissions-Policy is only served on responses
with an HTML related Content-Type.
This has been assigned the CVE identifier CVE-2024-28103.
Versions Affected: >= 6.1.0
Not affected: < 6.1.0
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4
Impact
------
Responses with a non-HTML Content-Type are not serving the configured Permissions-Policy. There are certain non-HTML Content-Types that would benefit from having the Permissions-Policy enforced.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
N/A
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the supported release series in accordance with our
[maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues)
regarding security issues. They are in git-am format and consist of a
single changeset.
* 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series
* 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series
* 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series
Credits
-------
Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-28103 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74621 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74613 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74576 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74585 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74604 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74581 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74559 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00832 |
| scoring_system |
epss |
| scoring_elements |
0.74532 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-28103 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-28103, GHSA-fwhr-88qx-h9g7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p22r-u1dd-b7b3 |
|
| 7 |
| url |
VCID-sfyc-jewr-wuf5 |
| vulnerability_id |
VCID-sfyc-jewr-wuf5 |
| summary |
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887.
Impact
------
For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for reporting |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52976 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5297 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52948 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52964 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52914 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.5287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52901 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47887 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47887, GHSA-vfg9-r3fq-jvx4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyc-jewr-wuf5 |
|
| 8 |
| url |
VCID-sgdb-985e-4uej |
| vulnerability_id |
VCID-sgdb-985e-4uej |
| summary |
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.
Impact
------
Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.
Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.
Releases
--------
The fixed releases are available at the normal locations.
Workarounds
-----------
Users on Ruby 3.2 are unaffected by this issue.
Credits
-------
Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches! |
| references |
| 0 |
|
| 1 |
| reference_url |
https://access.redhat.com/security/cve/cve-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://access.redhat.com/security/cve/cve-2024-41128 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69647 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69608 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69657 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69618 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00605 |
| scoring_system |
epss |
| scoring_elements |
0.69632 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-41128 |
|
| 3 |
| reference_url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://bugzilla.redhat.com/show_bug.cgi?id=2319036 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/rails/rails |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/rails/rails |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
MODERATE |
| scoring_system |
cvssv3.1_qr |
| scoring_elements |
|
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
|
| 2 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-17T17:09:25Z/ |
|
|
| url |
https://github.com/rails/rails/security/advisories/GHSA-x76w-6vjr-8xgj |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-41128, GHSA-x76w-6vjr-8xgj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sgdb-985e-4uej |
|
|