Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13d2h2LXd4djktcnBnd84ABATc

Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text

There is a possible ReDoS vulnerability in the plain_text_for_blockquote_node helper in Action Text. This vulnerability has been assigned the CVE identifier CVE-2024-47888.

Impact

Carefully crafted text can cause the plain_text_for_blockquote_node helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade or apply the relevant patch immediately.

Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected.

Releases

The fixed releases are available at the normal locations.

Workarounds

Users can avoid calling plain_text_for_blockquote_node or upgrade to Ruby 3.2

Credits

Thanks to ooooooo_q for the report!

Permalink: https://github.com/advisories/GHSA-wwhv-wxv9-rpgw
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13d2h2LXd4djktcnBnd84ABATc
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 2 days ago
Updated: 1 day ago


Identifiers: GHSA-wwhv-wxv9-rpgw, CVE-2024-47888
References: Repository: https://github.com/rails/rails
Blast Radius: 0.0

Affected Packages

rubygems:actiontext
Dependent packages: 7
Dependent repositories: 165,710
Downloads: 232,140,214 total
Affected Version Ranges: >= 7.2.0, < 7.2.1.1, >= 7.1.0, < 7.1.4.1, >= 7.0.0, < 7.0.8.5, >= 6.0.0, < 6.1.7.9
Fixed in: 7.2.1.1, 7.1.4.1, 7.0.8.5, 6.1.7.9
All affected versions: 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.2.0, 7.2.1
All unaffected versions: