logo

CVE-2024-54133 actionpack

Package

Manager: gem
Name: actionpack
Vulnerable Version: >=5.2.0 <7.0.8.7 || >=7.1.0 <7.1.5.1 || >=7.2.0 <7.2.2.1 || >=8.0.0 <8.0.0.1

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

EPSS: 0.00135 pctl0.34012

Details

Possible Content Security Policy bypass in Action Dispatch There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack. Impact ------ Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input. Credits ------- Thanks to [ryotak](https://hackerone.com/ryotak) for the report!

Metadata

Created: 2024-12-10T22:42:27Z
Modified: 2025-03-07T03:31:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-vfm5-rmrh-j26v/GHSA-vfm5-rmrh-j26v.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-vfm5-rmrh-j26v
Finding: F008
Auto approve: 1