Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/actionpack@7.1.4.1
purl pkg:gem/actionpack@7.1.4.1
Next non-vulnerable version 7.1.5.1
Latest non-vulnerable version 8.1.2.1
Risk 1.9
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-g3rk-djae-pkeh
Aliases:
CVE-2024-54133
GHSA-vfm5-rmrh-j26v
Possible Content Security Policy bypass in Action Dispatch There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack. Impact ------ Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. Credits ------- Thanks to [ryotak](https://hackerone.com/ryotak) for the report!
7.1.5.1
Affected by 0 other vulnerabilities.
7.2.0.beta1
Affected by 4 other vulnerabilities.
7.2.2.1
Affected by 0 other vulnerabilities.
8.0.0.beta1
Affected by 3 other vulnerabilities.
8.0.0.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-sfyc-jewr-wuf5 Possible ReDoS vulnerability in HTTP Token authentication in Action Controller There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887. Impact ------ For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for reporting CVE-2024-47887
GHSA-vfg9-r3fq-jvx4
VCID-sgdb-985e-4uej Possible ReDoS vulnerability in query parameter filtering in Action Dispatch There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128. Impact ------ Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users on Ruby 3.2 are unaffected by this issue. Credits ------- Thanks to [scyoon](https://hackerone.com/scyoon) for the report and patches! CVE-2024-41128
GHSA-x76w-6vjr-8xgj

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T17:41:16.018318+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.4.0
2026-04-12T00:35:40.878178+00:00 GitLab Importer Affected by VCID-g3rk-djae-pkeh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-54133.yml 38.3.0
2026-04-11T21:38:54.968965+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.3.0
2026-04-03T00:43:27.445294+00:00 GitLab Importer Affected by VCID-g3rk-djae-pkeh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-54133.yml 38.1.0
2026-04-02T19:36:41.126787+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.1.0
2026-04-02T12:40:15.363043+00:00 GitLab Importer Fixing VCID-sfyc-jewr-wuf5 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-47887.yml 38.0.0
2026-04-02T12:40:15.172680+00:00 GitLab Importer Fixing VCID-sgdb-985e-4uej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2024-41128.yml 38.0.0
2026-04-01T16:06:41.891530+00:00 GHSA Importer Fixing VCID-sfyc-jewr-wuf5 https://github.com/advisories/GHSA-vfg9-r3fq-jvx4 38.0.0
2026-04-01T16:06:41.736114+00:00 GHSA Importer Fixing VCID-sgdb-985e-4uej https://github.com/advisories/GHSA-x76w-6vjr-8xgj 38.0.0
2026-04-01T15:54:02.105284+00:00 Ruby Importer Affected by VCID-g3rk-djae-pkeh https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml 38.0.0
2026-04-01T12:49:12.588729+00:00 GithubOSV Importer Fixing VCID-sgdb-985e-4uej https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-x76w-6vjr-8xgj/GHSA-x76w-6vjr-8xgj.json 38.0.0
2026-04-01T12:49:10.371301+00:00 GithubOSV Importer Fixing VCID-sfyc-jewr-wuf5 https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-vfg9-r3fq-jvx4/GHSA-vfg9-r3fq-jvx4.json 38.0.0