CVE-2024-47888 – actiontext
Package
Manager: gem
Name: actiontext
Vulnerable Version: >=6.0.0 <6.1.7.9 || >=7.0.0 <7.0.8.5 || >=7.1.0 <7.1.4.1 || >=7.2.0 <7.2.1.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U
EPSS: 0.00445 pctl0.62551
Details
Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text There is a possible ReDoS vulnerability in the plain_text_for_blockquote_node helper in Action Text. This vulnerability has been assigned the CVE identifier CVE-2024-47888. Impact ------ Carefully crafted text can cause the plain_text_for_blockquote_node helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected. Releases -------- The fixed releases are available at the normal locations. Workarounds ----------- Users can avoid calling `plain_text_for_blockquote_node` or upgrade to Ruby 3.2 Credits ------- Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for the report!
Metadata
Created: 2024-10-15T23:35:36Z
Modified: 2024-12-02T19:53:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-wwhv-wxv9-rpgw/GHSA-wwhv-wxv9-rpgw.json
CWE IDs: ["CWE-1333"]
Alternative ID: GHSA-wwhv-wxv9-rpgw
Finding: F211
Auto approve: 1