Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:gem/rails@7.1.3
purl pkg:gem/rails@7.1.3
Next non-vulnerable version 7.1.3.1
Latest non-vulnerable version 7.1.3.1
Risk 3.4
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-5bh7-drnb-7ygg
Aliases:
CVE-2024-26143
GHSA-9822-6m93-xqf4
Rails has possible XSS Vulnerability in Action Controller # Possible XSS Vulnerability in Action Controller There is a possible XSS vulnerability when using the translation helpers (`translate`, `t`, etc) in Action Controller. This vulnerability has been assigned the CVE identifier CVE-2024-26143. Versions Affected: >= 7.0.0. Not affected: < 7.0.0 Fixed Versions: 7.1.3.1, 7.0.8.1 Impact ------ Applications using translation methods like `translate`, or `t` on a controller, with a key ending in "_html", a `:default` key which contains untrusted user input, and the resulting string is used in a view, may be susceptible to an XSS vulnerability. For example, impacted code will look something like this: ```ruby class ArticlesController < ApplicationController def show @message = t("message_html", default: untrusted_input) # The `show` template displays the contents of `@message` end end ``` To reiterate the pre-conditions, applications must: * Use a translation function from a controller (i.e. _not_ I18n.t, or `t` from a view) * Use a key that ends in `_html` * Use a default value where the default value is untrusted and unescaped input * Send the text to the victim (whether that's part of a template, or a `render` call) All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- There are no feasible workarounds for this issue. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 7-0-translate-xss.patch - Patch for 7.0 series * 7-1-translate-xss.patch - Patch for 7.1 series Credits ------- Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the patch and fix!
7.1.3.1
Affected by 0 other vulnerabilities.
VCID-ehbj-aezy-d7h4
Aliases:
CVE-2024-26142
GHSA-jjhx-jhvp-74wq
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch # Possible ReDoS vulnerability in Accept header parsing in Action Dispatch There is a possible ReDoS vulnerability in the Accept header parsing routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-26142. Versions Affected: >= 7.1.0, < 7.1.3.1 Not affected: < 7.1.0 Fixed Versions: 7.1.3.1 Impact ------ Carefully crafted Accept headers can cause Accept header parsing in Action Dispatch to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- There are no feasible workarounds for this issue. Patches ------- To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 7-1-accept-redox.patch - Patch for 7.1 series Credits ------- Thanks [svalkanov](https://hackerone.com/svalkanov) for the report and patch!
7.1.3.1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:52:39.057210+00:00 GitLab Importer Affected by VCID-ehbj-aezy-d7h4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26142.yml 38.4.0
2026-04-16T22:52:35.778912+00:00 GitLab Importer Affected by VCID-5bh7-drnb-7ygg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26143.yml 38.4.0
2026-04-12T00:11:15.534675+00:00 GitLab Importer Affected by VCID-ehbj-aezy-d7h4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26142.yml 38.3.0
2026-04-12T00:11:14.308184+00:00 GitLab Importer Affected by VCID-5bh7-drnb-7ygg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26143.yml 38.3.0
2026-04-03T00:17:16.200296+00:00 GitLab Importer Affected by VCID-ehbj-aezy-d7h4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26142.yml 38.1.0
2026-04-03T00:17:12.753713+00:00 GitLab Importer Affected by VCID-5bh7-drnb-7ygg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/rails/CVE-2024-26143.yml 38.1.0