Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/actionpack@6.1.8
purl pkg:gem/actionpack@6.1.8
Tags Ghost
Next non-vulnerable version 7.0.8.7
Latest non-vulnerable version 8.1.2.1
Risk 3.1
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-dd9p-x7k3-37ea
Aliases:
CVE-2023-28362
GHSA-4g8v-vg43-wpgf
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE identifier CVE-2023-28362. Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4
7.0.5.1
Affected by 6 other vulnerabilities.
VCID-sfyc-jewr-wuf5
Aliases:
CVE-2024-47887
GHSA-vfg9-r3fq-jvx4
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887. Impact ------ For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for reporting
7.0.0.alpha1
Affected by 6 other vulnerabilities.
7.0.8.5
Affected by 1 other vulnerability.
7.1.0.beta1
Affected by 4 other vulnerabilities.
7.1.4.1
Affected by 1 other vulnerability.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.1.1
Affected by 1 other vulnerability.
8.0.0.beta1
Affected by 3 other vulnerabilities.
VCID-sgdb-985e-4uej
Aliases:
CVE-2024-41128
GHSA-x76w-6vjr-8xgj
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128. Impact ------ Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches!
7.0.0.alpha1
Affected by 6 other vulnerabilities.
7.0.8.5
Affected by 1 other vulnerability.
7.1.0.beta1
Affected by 4 other vulnerabilities.
7.1.4.1
Affected by 1 other vulnerability.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.1.1
Affected by 1 other vulnerability.
8.0.0.beta1
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T15:18:20.099381+00:00 Ruby Importer Affected by VCID-dd9p-x7k3-37ea https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml 38.0.0
2026-04-01T15:18:19.840447+00:00 Ruby Importer Affected by VCID-sgdb-985e-4uej https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-41128.yml 38.0.0
2026-04-01T15:18:19.221509+00:00 Ruby Importer Affected by VCID-sfyc-jewr-wuf5 https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-47887.yml 38.0.0