Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5881-1 | rails security update |
Github GHSA |
GHSA-4g8v-vg43-wpgf | Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 02 May 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-116 | |
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 09 Jan 2025 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header. | The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. |
| References |
|
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-05-02T23:02:56.188Z
Reserved: 2023-03-15T01:00:13.221Z
Link: CVE-2023-28362
Updated: 2025-05-02T23:02:56.188Z
Status : Awaiting Analysis
Published: 2025-01-09T01:15:07.750
Modified: 2025-05-02T23:15:15.180
Link: CVE-2023-28362
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA