Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1wcmpwLWg0OGYtamdmNs4AA8tC
ActionText ContentAttachment can Contain Unsanitized HTML
Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML.
This has been assigned the CVE identifier CVE-2024-32464.
Versions Affected: >= 7.1.0
Not affected: < 7.1.0
Fixed Versions: 7.1.3.4
Impact
This could lead to a potential cross site scripting issue within the Trix editor.
Releases
The fixed releases are available at the normal locations.
Workarounds
N/A
Patches
To aid users who aren't able to upgrade immediately we have provided patches for the supported release series in accordance with our maintenance policy regarding security issues. They are in git-am format and consist of a single changeset.
- action_text_content_attachment_xss_7_1_stable.patch - Patch for 7.1 series
Credits
Thank you ooooooo_q for reporting this!
Permalink: https://github.com/advisories/GHSA-prjp-h48f-jgf6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wcmpwLWg0OGYtamdmNs4AA8tC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 6 months ago
Updated: 3 months ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Identifiers: GHSA-prjp-h48f-jgf6, CVE-2024-32464
References:
- https://github.com/rails/rails/security/advisories/GHSA-prjp-h48f-jgf6
- https://nvd.nist.gov/vuln/detail/CVE-2024-32464
- https://github.com/rails/rails/commit/e215bf3360e6dfe1497c1503a495e384ed6b0995
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actiontext/CVE-2024-32464.yml
- https://github.com/advisories/GHSA-prjp-h48f-jgf6
Blast Radius: 31.8
Affected Packages
rubygems:actiontext
Dependent packages: 7Dependent repositories: 165,710
Downloads: 240,732,391 total
Affected Version Ranges: = 7.2.0.beta1, >= 7.1.0, < 7.1.3.4
Fixed in: 7.2.0.beta2, 7.1.3.4
All affected versions: 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.2.0, 7.2.1, 7.2.2, 8.0.0
All unaffected versions: