Skip to content

Commit 47879ab

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@58766d8
1 parent 83c299e commit 47879ab

File tree

3 files changed

+139
-0
lines changed

3 files changed

+139
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-27090 (decidim): Decidim vulnerable to data disclosure through the
4+
embed feature'
5+
comments: false
6+
categories:
7+
- decidim
8+
advisory:
9+
gem: decidim
10+
cve: 2024-27090
11+
ghsa: qcj6-vxwx-4rqv
12+
url: https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv
13+
title: Decidim vulnerable to data disclosure through the embed feature
14+
date: 2024-07-10
15+
description: |
16+
### Impact
17+
If an attacker can infer the slug or URL of an unpublished or private
18+
resource, and this resource can be embedded (such as a Participatory
19+
Process, an Assembly, a Proposal, a Result, etc), then some data of
20+
this resource could be accessed.
21+
22+
### Patches
23+
24+
Version 0.27.6
25+
26+
https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705
27+
28+
### Workarounds
29+
30+
Disallow access through your web server to the URLs finished with `/embed.html`
31+
cvss_v3: 5.3
32+
patched_versions:
33+
- ">= 0.27.6"
34+
related:
35+
url:
36+
- https://nvd.nist.gov/vuln/detail/CVE-2024-27090
37+
- https://github.com/decidim/decidim/security/advisories/GHSA-qcj6-vxwx-4rqv
38+
- https://github.com/decidim/decidim/pull/12528
39+
- https://github.com/decidim/decidim/commit/1756fa639ef393ca8e8bb16221cab2e2e7875705
40+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
41+
- https://github.com/advisories/GHSA-qcj6-vxwx-4rqv
42+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-27095 (decidim-admin): Decidim cross-site scripting (XSS) in the
4+
admin panel'
5+
comments: false
6+
categories:
7+
- decidim-admin
8+
advisory:
9+
gem: decidim-admin
10+
cve: 2024-27095
11+
ghsa: 529p-jj47-w3m3
12+
url: https://github.com/decidim/decidim/security/advisories/GHSA-529p-jj47-w3m3
13+
title: Decidim cross-site scripting (XSS) in the admin panel
14+
date: 2024-07-10
15+
description: |
16+
### Impact
17+
18+
The admin panel is subject to potential XSS attach in case the attacker
19+
manages to modify some records being uploaded to the server.
20+
21+
The attacker is able to change e.g. to `<svg onload=alert('XSS')>`
22+
if they know how to craft these requests themselves. And then enter
23+
the returned blob ID to the form inputs manually by modifying the
24+
edit page source.
25+
26+
### Patches
27+
28+
Available in versions 0.27.6 and 0.28.1.
29+
30+
### Workarounds
31+
32+
Review the user accounts that have access to the admin panel (i.e.
33+
general Administrators, and participatory space's Administrators)
34+
and remove access to them if they don't need it.
35+
36+
### References
37+
38+
OWASP ASVS v4.0.3-5.1.3
39+
cvss_v3: 5.4
40+
patched_versions:
41+
- "~> 0.27.6"
42+
- ">= 0.28.1"
43+
related:
44+
url:
45+
- https://nvd.nist.gov/vuln/detail/CVE-2024-27095
46+
- https://github.com/decidim/decidim/security/advisories/GHSA-529p-jj47-w3m3
47+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
48+
- https://github.com/decidim/decidim/releases/tag/v0.28.1
49+
- https://github.com/advisories/GHSA-529p-jj47-w3m3
50+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-32469 (decidim): Decidim cross-site scripting (XSS) in the pagination'
4+
comments: false
5+
categories:
6+
- decidim
7+
advisory:
8+
gem: decidim
9+
cve: 2024-32469
10+
ghsa: 7cx8-44pc-xv3q
11+
url: https://github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3q
12+
title: Decidim cross-site scripting (XSS) in the pagination
13+
date: 2024-07-10
14+
description: |
15+
### Impact
16+
17+
The pagination feature used in searches and filters is subject to
18+
potential XSS attack through a malformed URL using the GET parameter
19+
`per_page`.
20+
21+
### Patches
22+
23+
Patched in version 0.27.6 and 0.28.1
24+
25+
### References
26+
27+
OWASP ASVS v4.0.3-5.1.3
28+
29+
### Credits
30+
31+
This issue was discovered in a security audit organized by the
32+
[mitgestalten Partizipationsbüro](https://partizipationsbuero.at/)
33+
and funded by [netidee](https://www.netidee.at/) against Decidim
34+
done during April 2024. The security audit was implemented by
35+
[AIT Austrian Institute of Technology GmbH](https://www.ait.ac.at/),
36+
cvss_v3: 7.1
37+
patched_versions:
38+
- "~> 0.27.6"
39+
- ">= 0.28.1"
40+
related:
41+
url:
42+
- https://nvd.nist.gov/vuln/detail/CVE-2024-32469
43+
- https://github.com/decidim/decidim/security/advisories/GHSA-7cx8-44pc-xv3q
44+
- https://github.com/decidim/decidim/releases/tag/v0.27.6
45+
- https://github.com/decidim/decidim/releases/tag/v0.28.1
46+
- https://github.com/advisories/GHSA-7cx8-44pc-xv3q
47+
---

0 commit comments

Comments
 (0)