All the vulnerabilites related to Rails - Action Pack
cve-2023-28362
Vulnerability from cvelistv5
Published
2025-01-09 00:33
Modified
2025-01-09 21:28
Severity ?
EPSS score ?
Summary
The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Rails | Action Pack |
Version: 7.0.5.1 < 7.0.5.1 Version: 6.1.7.4 < 6.1.7.4 |
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-28362", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-09T21:26:42.827377Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-09T21:28:00.488Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Action Pack", "vendor": "Rails", "versions": [ { "lessThan": "7.0.5.1", "status": "affected", "version": "7.0.5.1", "versionType": "custom" }, { "lessThan": "6.1.7.4", "status": "affected", "version": "6.1.7.4", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header." } ], "providerMetadata": { "dateUpdated": "2025-01-09T00:33:47.730Z", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "url": "https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132" }, { "url": "https://github.com/advisories/GHSA-4g8v-vg43-wpgf" }, { "url": "https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441" }, { "url": "https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5" } ] } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2023-28362", "datePublished": "2025-01-09T00:33:47.730Z", "dateReserved": "2023-03-15T01:00:13.221Z", "dateUpdated": "2025-01-09T21:28:00.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }