File tree Expand file tree Collapse file tree 11 files changed +153
-2
lines changed
Expand file tree Collapse file tree 11 files changed +153
-2
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : delayed_job_web
3+ cve : 2017-12097
4+ url : https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449
5+ date : 2018-01-10
6+ title : delayed_job_web ruby gem XSS vulnerability via `queues` parameter
7+ description : |
8+ An exploitable cross site scripting (XSS) vulnerability exists in the
9+ filter functionality of the delayed_job_web ruby gem. A specially crafted
10+ URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary
11+ javascript on the victim's browser. An attacker can phish an authenticated user
12+ to trigger this vulnerability.
13+
14+ cvss_v3 : 6.1
15+
16+ patched_versions :
17+ - " >= 1.4.2"
File renamed without changes.
Original file line number Diff line number Diff line change 1+ ---
2+ gem : openssl
3+ cve : 2016-7798
4+ url : https://github.com/ruby/openssl/issues/49
5+ date : 2017-10-24
6+ title : Incorrect handling of initialization vector in the GCM mode in OpenSSL
7+ description : |
8+ The openssl gem for Ruby uses the same initialization vector (IV) in
9+ GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for
10+ context-dependent attackers to bypass the encryption protection mechanism.
11+
12+ cvss_v3 : 7.5
13+ cvss_v2 : 5.0
14+
15+ patched_versions :
16+ - " >= 2.0.0"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : ox
3+ cve : 2017-15928
4+ url : https://github.com/ohler55/ox/issues/194
5+ date : 2017-10-27
6+ title : ox ruby gem segmentation fault via parse_obj
7+ description : |
8+ In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation
9+ fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated
10+ "Ox should handle the error more gracefully" but has not confirmed a security implication.
11+
12+ cvss_v3 : 7.5
13+ cvss_v2 : 5.0
14+
15+ patched_versions :
16+ - " >= 2.8.1"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : ox
3+ cve : 2017-16229
4+ url : https://github.com/ohler55/ox/issues/195
5+ date : 2017-10-29
6+ title : ox ruby gem stack overflow in sax_parse
7+ description : |
8+ In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based
9+ buffer over-read in the read_from_str function in sax_buf.c when a crafted input
10+ is supplied to sax_parse.
11+
12+ cvss_v3 : 5.5
13+ cvss_v2 : 4.3
14+
15+ patched_versions :
16+ - " >= 2.8.2"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : rack-protection
3+ cve : 2018-1000119
4+ url : https://github.com/sinatra/rack-protection/pull/98
5+ date : 2018-03-07
6+ title : rack-protection gem timing attack vulnerability when validating CSRF token
7+ description : |
8+ Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains
9+ a timing attack vulnerability in the CSRF token checking that can result in signatures
10+ can be exposed. This attack appear to be exploitable via network connectivity to
11+ the ruby application.
12+
13+ cvss_v3 : 5.9
14+ cvss_v2 : 4.3
15+
16+ patched_versions :
17+ - ~> 1.5.5
18+ - " >= 2.0.0"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : radiant
3+ cve : 2018-5216
4+ url : https://github.com/imsebao/404team/blob/master/radiantcms.md
5+ date : 2018-01-04
6+ title : Radiant CMS 1.1.4 Markdown admin/pages/*/edit part_body_content cross site scripting
7+ description : |
8+ Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content
9+ parameter to an admin/pages/*/edit resource.
10+
11+ cvss_v3 : 5.4
12+ cvss_v2 : 3.5
Original file line number Diff line number Diff line change 1+ ---
2+ gem : rails_admin
3+ cve : 2017-12098
4+ url : https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450
5+ date : 2018-01-10
6+ title : rails_admin ruby gem XSS vulnerability
7+ description : |
8+ An exploitable cross site scripting (XSS) vulnerability exists in the
9+ add filter functionality of the rails_admin rails gem version 1.2.0. A specially
10+ crafted URL can cause an XSS flaw resulting in an attacker being able to execute
11+ arbitrary javascript on the victim's browser. An attacker can phish an authenticated
12+ user to trigger this vulnerability.
13+
14+ cvss_v3 : 6.1
15+ cvss_v2 : 4.3
16+
17+ patched_versions :
18+ - " >= 1.3.0"
19+
20+ related :
21+ url :
22+ - https://github.com/sferik/rails_admin/issues/2985
Original file line number Diff line number Diff line change 1+ ---
2+ gem : rest-client
3+ cve : 2015-3448
4+ url : https://github.com/rest-client/rest-client/issues/349
5+ date : 2017-10-24
6+ title : rest-client ruby gem logs sensitive information
7+ description : |
8+ REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and
9+ passwords, which allows local users to obtain sensitive information by reading the
10+ log.
11+
12+ cvss_v2 : 2.1
13+
14+ patched_versions :
15+ - " >= 1.7.3"
Original file line number Diff line number Diff line change 1+ ---
2+ gem : sinatra
3+ cve : 2018-7212
4+ url : https://github.com/sinatra/sinatra/pull/1379
5+ date : 2018-01-09
6+ title : sinatra ruby gem path traversal via backslash characters on Windows
7+ description : |
8+ An issue was discovered in rack-protection/lib/rack/protection/path_traversal.rb
9+ in Sinatra 2.x before 2.0.1 on Windows. Path traversal is possible via backslash
10+ characters.
11+
12+ cvss_v3 : 5.3
13+ cvss_v2 : 5.0
14+
15+ patched_versions :
16+ - " >= 2.0.1"
17+
18+ unaffected_versions :
19+ - " < 2.0.0"
You can’t perform that action at this time.
0 commit comments