Skip to content

Commit a03bda5

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@b32baf6
1 parent bfb309e commit a03bda5

4 files changed

+31
-10
lines changed

advisories/_posts/2023-03-13-CVE-2023-27531.md

+4-1
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ advisory:
1010
gem: kredis
1111
framework: rails
1212
cve: 2023-27531
13+
notes: CVE has be reserved, but not filled in.
1314
ghsa: h2wm-p2vg-6pw4
1415
url: https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
1516
title: Possible Deserialization of Untrusted Data Vulnerability in Kredis JSON
@@ -42,14 +43,16 @@ advisory:
4243
are in git-am format and consist of a single changeset.
4344
4445
* 1-3-0-1-kredis.patch - Patch for 1.3.0 series
46+
cvss_v3: 5.3
4547
patched_versions:
4648
- ">= 1.3.0.1"
4749
related:
4850
url:
51+
- https://nvd.nist.gov/vuln/detail/CVE-2023-27531
4952
- https://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467#post_1
5053
- https://github.com/rails/kredis/releases/tag/v1.3.0.1
5154
- https://my.diffend.io/gems/kredis/1.3.0/1.3.0.1
5255
- https://cve.report/CVE-2023-27531
5356
- https://github.com/jasnow/gsd-database/blob/main/2023/27xxx/GSD-2023-27531.json
54-
notes: CVE has be reserved, but not filled in.
57+
- https://github.com/advisories/GHSA-h2wm-p2vg-6pw4
5558
---

advisories/_posts/2023-03-13-CVE-2023-28120.md

+1
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ advisory:
3232
# Workarounds
3333
3434
Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input.
35+
cvss_v3: 5.3
3536
patched_versions:
3637
- "~> 6.1.7, >= 6.1.7.3"
3738
- ">= 7.0.4.3"

advisories/_posts/2023-06-26-CVE-2023-28362.md

+1
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ advisory:
3737
3838
Avoid providing user supplied URLs with arbitrary schemes to the redirect_to
3939
method.
40+
cvss_v3: 4.0
4041
patched_versions:
4142
- "~> 6.1.7.4"
4243
- ">= 7.0.5.1"

advisories/_posts/2023-08-23-CVE-2023-38037.md

+25-9
Original file line numberDiff line numberDiff line change
@@ -15,32 +15,48 @@ advisory:
1515
title: Possible File Disclosure of Locally Encrypted Files
1616
date: 2023-08-23
1717
description: |
18-
There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037.
18+
There is a possible file disclosure of locally encrypted files in
19+
Active Support. This vulnerability has been assigned the
20+
CVE identifier CVE-2023-38037.
1921
20-
Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5
22+
* Versions Affected: >= 5.2.0
23+
* Not affected: < 5.2.0
24+
* Fixed Versions: 7.0.7.1, 6.1.7.5
2125
2226
# Impact
23-
ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file.
2427
25-
Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it.
28+
ActiveSupport::EncryptedFile writes contents that will be encrypted
29+
to a temporary file. The temporary file’s permissions are defaulted
30+
to the user’s current umask settings, meaning that it’s possible
31+
for other users on the same system to read the contents of the
32+
temporary file.
2633
27-
All users running an affected release should either upgrade or use one of the workarounds immediately.
34+
Attackers that have access to the file system could possibly read
35+
the contents of this temporary file while a user is editing it.
36+
37+
All users running an affected release should either upgrade or use
38+
one of the workarounds immediately.
2839
2940
# Releases
41+
3042
The fixed releases are available at the normal locations.
3143
3244
# Workarounds
33-
To work around this issue, you can set your umask to be more restrictive like this:
3445
35-
```ruby
36-
$ umask 0077
37-
```
46+
To work around this issue, you can set your umask to be more
47+
restrictive like this:
48+
49+
$ umask 0077
50+
cvss_v3: 5.5
3851
unaffected_versions:
3952
- "< 5.2.0"
4053
patched_versions:
4154
- "~> 6.1.7, >= 6.1.7.5"
4255
- ">= 7.0.7.1"
4356
related:
4457
url:
58+
- https://nvd.nist.gov/vuln/detail/CVE-2023-38037
59+
- https://github.com/rails/rails/releases/tag/v7.0.7.1
4560
- https://github.com/rails/rails/commit/a21d6edf35a60383dfa6c4da49e4b1aef5f00731
61+
- https://github.com/advisories/GHSA-cr5q-6q9f-rq6q
4662
---

0 commit comments

Comments
 (0)