Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/rails@5.2.4.3
purl pkg:gem/rails@5.2.4.3
Next non-vulnerable version 6.1.7.7
Latest non-vulnerable version 7.1.3.1
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-5qu2-b8gt-7qe3
Aliases:
CVE-2021-22880
GHSA-8hc4-xxm3-5ppp
Active Record subject to Regular Expression Denial-of-Service (ReDoS) The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
5.2.4.5
Affected by 6 other vulnerabilities.
6.0.3.5
Affected by 8 other vulnerabilities.
6.1.2.1
Affected by 9 other vulnerabilities.
VCID-63gy-6njy-kbd8
Aliases:
CVE-2023-22792
GHSA-p84v-45xj-wwqj
GMS-2023-58
ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted `X_FORWARDED_HOST` header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
6.0.6.1
Affected by 2 other vulnerabilities.
6.1.7.1
Affected by 1 other vulnerability.
7.0.4.1
Affected by 2 other vulnerabilities.
VCID-65tq-e5eb-eucj
Aliases:
CVE-2024-26144
GHSA-8h22-8cf7-hq6g
Rails has possible Sensitive Session Information Leak in Active Storage # Possible Sensitive Session Information Leak in Active Storage There is a possible sensitive session information leak in Active Storage. By default, Active Storage sends a `Set-Cookie` header along with the user's session cookie when serving blobs. It also sets `Cache-Control` to public. Certain proxies may cache the Set-Cookie, leading to an information leak. This vulnerability has been assigned the CVE identifier CVE-2024-26144. Versions Affected: >= 5.2.0, < 7.1.0 Not affected: < 5.2.0, > 7.1.0 Fixed Versions: 7.0.8.1, 6.1.7.7 Impact ------ A proxy which chooses to caches this request can cause users to share sessions. This may include a user receiving an attacker's session or vice versa. This was patched in 7.1.0 but not previously identified as a security vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Upgrade to Rails 7.1.X, or configure caching proxies not to cache the Set-Cookie headers. Credits ------- Thanks to [tyage](https://hackerone.com/tyage) for reporting this!
6.1.7.7
Affected by 0 other vulnerabilities.
7.0.8.1
Affected by 0 other vulnerabilities.
VCID-gjey-bqtd-kqa1
Aliases:
CVE-2021-22885
GHSA-hjg4-8q5f-x6fm
Action Pack contains Information Disclosure / Unintended Method Execution vulnerability Impact ------ There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input. Vulnerable code will look like this. ``` redirect_to(params[:some_param]) ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The FIXED releases are available at the normal locations. Workarounds ----------- To work around this problem, it is recommended to use an allow list for valid parameters passed from the user. For example, ```ruby private def check(param) case param when "valid" param else "/" end end def index redirect_to(check(params[:some_param])) end ``` Or force the user input to be cast to a string like this, ```ruby def index redirect_to(params[:some_param].to_s) end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-information-disclosure.patch - Patch for 5.2 series * 6-0-information-disclosure.patch - Patch for 6.0 series * 6-1-information-disclosure.patch - Patch for 6.1 series Please note that only the 5.2, 6.0, and 6.1 series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thanks to Benoit Côté-Jodoin from Shopify for reporting this.
5.2.4.6
Affected by 4 other vulnerabilities.
6.0.3.7
Affected by 5 other vulnerabilities.
6.1.3.1
Affected by 8 other vulnerabilities.
VCID-hppf-a715-r7b2
Aliases:
CVE-2023-22795
GHSA-8xww-x3g3-6jcv
GMS-2023-56
ReDoS based DoS vulnerability in Action Dispatch There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795. A specially crafted HTTP `If-None-Match` header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
6.1.7.1
Affected by 1 other vulnerability.
7.0.4.1
Affected by 2 other vulnerabilities.
VCID-jwun-grgg-2uet
Aliases:
CVE-2022-23633
CVE-2022-23634
GHSA-rmj8-8hhh-gv5h
GHSA-wh98-p28r-vrc9
Exposure of information in Action Pack Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests. This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
5.2.6.2
Affected by 3 other vulnerabilities.
6.0.0.beta1
Affected by 4 other vulnerabilities.
6.0.4.6
Affected by 3 other vulnerabilities.
6.1.0.rc1
Affected by 3 other vulnerabilities.
6.1.4.6
Affected by 3 other vulnerabilities.
7.0.0.alpha1
Affected by 0 other vulnerabilities.
7.0.2.2
Affected by 5 other vulnerabilities.
VCID-wg3a-j2dp-ayh4
Aliases:
CVE-2021-22904
GHSA-7wjx-3g7j-8584
Possible DoS Vulnerability in Action Controller Token Authentication There is a possible DoS vulnerability in the Token Authentication logic in Action Controller. Versions Affected: >= 4.0.0 Not affected: < 4.0.0 Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 Impact ------ Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impacted code will look something like this: ``` class PostsController < ApplicationController before_action :authenticate private def authenticate authenticate_or_request_with_http_token do |token, options| # ... end end end ``` All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- The following monkey patch placed in an initializer can be used to work around the issue: ```ruby module ActionController::HttpAuthentication::Token AUTHN_PAIR_DELIMITERS = /(?:,|;|\t)/ end ``` Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 5-2-http-authentication-dos.patch - Patch for 5.2 series * 6-0-http-authentication-dos.patch - Patch for 6.0 series * 6-1-http-authentication-dos.patch - Patch for 6.1 series Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits ------- Thank you to https://hackerone.com/wonda_tea_coffee for reporting this issue!
5.2.4.6
Affected by 4 other vulnerabilities.
5.2.6
Affected by 4 other vulnerabilities.
6.0.3.7
Affected by 5 other vulnerabilities.
6.1.3.2
Affected by 7 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-a6sp-18av-wya6 Possible Strong Parameters Bypass in ActionPack There is a strong parameters bypass vector in ActionPack. Versions Affected: rails <= 6.0.3 Not affected: rails < 5.0.0 Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ In some cases user supplied information can be inadvertently leaked from Strong Parameters. Specifically the return value of `each`, or `each_value`, or `each_pair` will return the underlying "untrusted" hash of data that was read from the parameters. Applications that use this return value may be inadvertently use untrusted user input. Impacted code will look something like this: ``` def update # Attacker has included the parameter: `{ is_admin: true }` User.update(clean_up_params) end def clean_up_params params.each { |k, v| SomeModel.check(v) if k == :name } end ``` Note the mistaken use of `each` in the `clean_up_params` method in the above example. Workarounds ----------- Do not use the return values of `each`, `each_value`, or `each_pair` in your application. CVE-2020-8164
GHSA-8727-m6gj-mc37
VCID-es1t-7196-4kbb CSRF Vulnerability in rails-ujs There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains. Versions Affected: rails <= 6.0.3 Not affected: Applications which don't use rails-ujs. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ This is a regression of CVE-2015-1840. In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent. Workarounds ----------- To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters. For example, code like this: link_to params to code like this: link_to filtered_params def filtered_params # Filter just the parameters that you trust end CVE-2020-8167
GHSA-xq5j-gw7f-jgj8
VCID-mnkw-23eu-bkgc Ability to forge per-form CSRF tokens in Rails It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session. Impact ------ Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. CVE-2020-8166
GHSA-jp5v-5gx4-jmj9
VCID-t684-yp58-hkg8 ActiveSupport potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore In ActiveSupport, there is potentially unexpected behaviour in the MemCacheStore and RedisCacheStore where, when untrusted user input is written to the cache store using the `raw: true` parameter, re-reading the result from the cache can evaluate the user input as a Marshalled object instead of plain text. Vulnerable code looks like: ``` data = cache.fetch("demo", raw: true) { untrusted_string } ``` Versions Affected: rails < 5.2.5, rails < 6.0.4 Not affected: Applications not using MemCacheStore or RedisCacheStore. Applications that do not use the `raw` option when storing untrusted user input. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Unmarshalling of untrusted user input can have impact up to and including RCE. At a minimum, this vulnerability allows an attacker to inject untrusted Ruby objects into a web application. In addition to upgrading to the latest versions of Rails, developers should ensure that whenever they are calling `Rails.cache.fetch` they are using consistent values of the `raw` parameter for both reading and writing, especially in the case of the RedisCacheStore which does not, prior to these changes, detect if data was serialized using the raw option upon deserialization. Workarounds ----------- It is recommended that application developers apply the suggested patch or upgrade to the latest release as soon as possible. If this is not possible, we recommend ensuring that all user-provided strings cached using the `raw` argument should be double-checked to ensure that they conform to the expected format. CVE-2020-8165
GHSA-2p68-f74v-9wc6

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-12T00:11:15.806454+00:00 GitLab Importer Affected by VCID-65tq-e5eb-eucj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26144.yml 38.3.0
2026-04-11T23:39:31.110425+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.3.0
2026-04-11T23:39:28.352222+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22792.yml 38.3.0
2026-04-11T22:55:28.996444+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2022-23633.yml 38.3.0
2026-04-11T22:39:01.405526+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22904.yml 38.3.0
2026-04-11T22:38:10.302470+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22885.yml 38.3.0
2026-04-11T22:29:28.164688+00:00 GitLab Importer Affected by VCID-5qu2-b8gt-7qe3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22880.yml 38.3.0
2026-04-11T22:16:34.602296+00:00 GitLab Importer Fixing VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8166.yml 38.3.0
2026-04-11T22:16:17.357751+00:00 GitLab Importer Fixing VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8164.yml 38.3.0
2026-04-11T22:16:12.117041+00:00 GitLab Importer Fixing VCID-es1t-7196-4kbb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8167.yml 38.3.0
2026-04-11T22:16:07.208599+00:00 GitLab Importer Fixing VCID-t684-yp58-hkg8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8165.yml 38.3.0
2026-04-03T00:17:16.602567+00:00 GitLab Importer Affected by VCID-65tq-e5eb-eucj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26144.yml 38.1.0
2026-04-02T23:43:40.695827+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.1.0
2026-04-02T23:43:38.346456+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22792.yml 38.1.0
2026-04-02T23:04:33.160483+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2022-23633.yml 38.1.0
2026-04-02T22:49:37.906419+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22904.yml 38.1.0
2026-04-02T22:48:52.338753+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22885.yml 38.1.0
2026-04-02T22:41:00.367565+00:00 GitLab Importer Affected by VCID-5qu2-b8gt-7qe3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22880.yml 38.1.0
2026-04-02T22:28:44.131415+00:00 GitLab Importer Fixing VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8166.yml 38.1.0
2026-04-02T22:28:27.566005+00:00 GitLab Importer Fixing VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8164.yml 38.1.0
2026-04-02T22:28:22.920306+00:00 GitLab Importer Fixing VCID-es1t-7196-4kbb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8167.yml 38.1.0
2026-04-02T22:28:17.860454+00:00 GitLab Importer Fixing VCID-t684-yp58-hkg8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8165.yml 38.1.0
2026-04-01T18:06:34.921528+00:00 GitLab Importer Affected by VCID-hppf-a715-r7b2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22795.yml 38.0.0
2026-04-01T18:06:32.266269+00:00 GitLab Importer Affected by VCID-63gy-6njy-kbd8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2023-22792.yml 38.0.0
2026-04-01T17:23:29.671500+00:00 GitLab Importer Affected by VCID-jwun-grgg-2uet https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2022-23633.yml 38.0.0
2026-04-01T17:07:33.350536+00:00 GitLab Importer Affected by VCID-wg3a-j2dp-ayh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22904.yml 38.0.0
2026-04-01T17:06:44.051798+00:00 GitLab Importer Affected by VCID-gjey-bqtd-kqa1 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22885.yml 38.0.0
2026-04-01T16:58:29.011158+00:00 GitLab Importer Affected by VCID-5qu2-b8gt-7qe3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2021-22880.yml 38.0.0
2026-04-01T16:46:43.400764+00:00 GitLab Importer Fixing VCID-mnkw-23eu-bkgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8166.yml 38.0.0
2026-04-01T16:46:25.435578+00:00 GitLab Importer Fixing VCID-a6sp-18av-wya6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8164.yml 38.0.0
2026-04-01T16:46:20.024072+00:00 GitLab Importer Fixing VCID-es1t-7196-4kbb https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8167.yml 38.0.0
2026-04-01T16:46:15.023404+00:00 GitLab Importer Fixing VCID-t684-yp58-hkg8 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2020-8165.yml 38.0.0