Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rails@2:7.2.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rails@2:7.2.2.1%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (9)
Vulnerability Summary Aliases
VCID-3hur-esmy-x3hr Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text There is a possible ReDoS vulnerability in the plain_text_for_blockquote_node helper in Action Text. This vulnerability has been assigned the CVE identifier CVE-2024-47888. Impact ------ Carefully crafted text can cause the plain_text_for_blockquote_node helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users can avoid calling `plain_text_for_blockquote_node` or upgrade to Ruby 3.2 Credits ------- Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report! CVE-2024-47888
GHSA-wwhv-wxv9-rpgw
VCID-65tq-e5eb-eucj Rails has possible Sensitive Session Information Leak in Active Storage # Possible Sensitive Session Information Leak in Active Storage There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a `Set-Cookie` header along with the user's session cookie when serving blobs. It also sets `Cache-Control` to public. Certain proxies may cache the Set-Cookie, leading to an information leak. This vulnerability has been assigned the CVE identifier CVE-2024-26144. Versions Affected: >= 5.2.0, < 7.1.0 Not affected: < 5.2.0, > 7.1.0 Fixed Versions: 7.0.8.1, 6.1.7.7 Impact ------ A proxy which chooses to caches this request can cause users to share sessions. This may include a user receiving an attacker's session or vice versa. This was patched in 7.1.0 but not previously identified as a security vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Upgrade to Rails 7.1.X, or configure caching proxies not to cache the Set-Cookie headers. Credits ------- Thanks to [tyage](https://hackerone.com/tyage) for reporting this! CVE-2024-26144
GHSA-8h22-8cf7-hq6g
VCID-6pxd-xsaw-tuer Active Support Possibly Discloses Locally Encrypted Files There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5 CVE-2023-38037
GHSA-cr5q-6q9f-rq6q
VCID-dd9p-x7k3-37ea Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362. Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4 CVE-2023-28362
GHSA-4g8v-vg43-wpgf
VCID-g3rk-djae-pkeh Possible Content Security Policy bypass in Action Dispatch There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack. Impact ------ Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. Credits ------- Thanks to [ryotak](https://hackerone.com/ryotak) for the report! CVE-2024-54133
GHSA-vfm5-rmrh-j26v
VCID-p22r-u1dd-b7b3 Missing security headers in Action Pack on non-HTML responses # Permissions-Policy is Only Served on HTML Content-Type The application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This has been assigned the CVE identifier CVE-2024-28103. Versions Affected: >= 6.1.0 Not affected: < 6.1.0 Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4 Impact ------ Responses with a non-HTML Content-Type are not serving the configured Permissions-Policy. There are certain non-HTML Content-Types that would benefit from having the Permissions-Policy enforced. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- N/A Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the supported release series in accordance with our [maintenance policy](https://guides.rubyonrails.org/maintenance_policy.html#security-issues) regarding security issues. They are in git-am format and consist of a single changeset. * 6-1-include-permissions-policy-header-on-non-html.patch - Patch for 6.1 series * 7-0-include-permissions-policy-header-on-non-html.patch - Patch for 7.0 series * 7-1-include-permissions-policy-header-on-non-html.patch - Patch for 7.1 series Credits ------- Thank you [shinkbr](https://hackerone.com/shinkbr) for reporting this! CVE-2024-28103
GHSA-fwhr-88qx-h9g7
VCID-sfyc-jewr-wuf5 Possible ReDoS vulnerability in HTTP Token authentication in Action Controller There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887. Impact ------ For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for reporting CVE-2024-47887
GHSA-vfg9-r3fq-jvx4
VCID-sgdb-985e-4uej Possible ReDoS vulnerability in query parameter filtering in Action Dispatch There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128. Impact ------ Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches! CVE-2024-41128
GHSA-x76w-6vjr-8xgj
VCID-yy6t-ybeu-qycc Possible ReDoS vulnerability in block_format in Action Mailer There is a possible ReDoS vulnerability in the block_format helper in Action Mailer. This vulnerability has been assigned the CVE identifier CVE-2024-47889. Impact ------ Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users can avoid calling the `block_format` helper or upgrade to Ruby 3.2 Credits ------- Thanks to yuki_osaki for the report! CVE-2024-47889
GHSA-h47h-mwp9-c6q6

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T10:37:44.276212+00:00 Debian Importer Fixing VCID-3hur-esmy-x3hr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:43.699087+00:00 Debian Importer Fixing VCID-6pxd-xsaw-tuer https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:36.430876+00:00 Debian Importer Fixing VCID-p22r-u1dd-b7b3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:00:08.621797+00:00 Debian Importer Fixing VCID-sfyc-jewr-wuf5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:55:56.948486+00:00 Debian Importer Fixing VCID-yy6t-ybeu-qycc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:30:55.645902+00:00 Debian Importer Fixing VCID-65tq-e5eb-eucj https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:48:05.720216+00:00 Debian Importer Fixing VCID-dd9p-x7k3-37ea https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:54.412036+00:00 Debian Importer Fixing VCID-sgdb-985e-4uej https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:41:02.533776+00:00 Debian Importer Fixing VCID-g3rk-djae-pkeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T07:25:09.269430+00:00 Debian Importer Fixing VCID-yy6t-ybeu-qycc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:03.142941+00:00 Debian Importer Fixing VCID-3hur-esmy-x3hr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:12.919509+00:00 Debian Importer Fixing VCID-6pxd-xsaw-tuer https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:48:03.748724+00:00 Debian Importer Fixing VCID-p22r-u1dd-b7b3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:42:17.637651+00:00 Debian Importer Fixing VCID-sfyc-jewr-wuf5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:41:40.683914+00:00 Debian Importer Fixing VCID-dd9p-x7k3-37ea https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:20:46.152299+00:00 Debian Importer Fixing VCID-65tq-e5eb-eucj https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:42.742346+00:00 Debian Importer Fixing VCID-sgdb-985e-4uej https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:50:13.458020+00:00 Debian Importer Fixing VCID-g3rk-djae-pkeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:50.223830+00:00 Debian Importer Fixing VCID-g3rk-djae-pkeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:50.150886+00:00 Debian Importer Fixing VCID-yy6t-ybeu-qycc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:50.078122+00:00 Debian Importer Fixing VCID-3hur-esmy-x3hr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:50.005007+00:00 Debian Importer Fixing VCID-sfyc-jewr-wuf5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.932141+00:00 Debian Importer Fixing VCID-sgdb-985e-4uej https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.808629+00:00 Debian Importer Fixing VCID-p22r-u1dd-b7b3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.733913+00:00 Debian Importer Fixing VCID-65tq-e5eb-eucj https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.560137+00:00 Debian Importer Fixing VCID-6pxd-xsaw-tuer https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:49.484731+00:00 Debian Importer Fixing VCID-dd9p-x7k3-37ea https://security-tracker.debian.org/tracker/data/json 38.1.0