[Bug 1207449] New: VUL-0: CVE-2023-22797: rubygem-actionpack-*: Possible Open Redirect Vulnerability in Action Pack
https://bugzilla.suse.com/show_bug.cgi?id=1207449 Bug ID: 1207449 Summary: VUL-0: CVE-2023-22797: rubygem-actionpack-*: Possible Open Redirect Vulnerability in Action Pack Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: mschnitzer@suse.com Reporter: rfrohl@suse.com QA Contact: security-team@suse.de CC: coolo@suse.com Found By: --- Blocker: --- Created attachment 864342 --> https://bugzilla.suse.com/attachment.cgi?id=864342&action=edit patch Possible Open Redirect Vulnerability in Action Pack There is a vulnerability in Action Controller���s redirect_to. This vulnerability has been assigned the CVE identifier CVE-2023-22797. Versions Affected: >= 7.0.0 Not affected: < 7.0.0 Fixed Versions: 7.0.4.1 Impact There is a possible open redirect when using the redirect_to helper with untrusted user input. Vulnerable code will look like this: redirect_to(params[:some_param]) Rails 7.0 introduced protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could be bypassed by a carefully crafted URL. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Patches To aid users who aren���t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 7-0-Fix-sec-issue-with-_url_host_allowed.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits We would like to thank wonda_tea_coffee for reporting this and providing a patch. https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vuln... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207449 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207449 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- URL| |https://smash.suse.de/issue | |/354919/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207449 https://bugzilla.suse.com/show_bug.cgi?id=1207449#c1 --- Comment #1 from Robert Frohl <rfrohl@suse.com> --- only affects - openSUSE:Factory/rubygem-activerecord-7.0 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207449 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard| |CVSSv3.1:SUSE:CVE-2023-2279 | |7:6.5:(AV:N/AC:L/PR:N/UI:R/ | |S:U/C:H/I:N/A:N) -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com