Description
turbo_boost-commands is a set of commands to help you build robust reactive applications with Rails & Hotwire. TurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren't as robust as they should be. It's possible for a sophisticated attacker to invoke more methods than should be permitted depending on the the strictness of authorization checks that individual applications enforce. Being able to call some of these methods can have security implications. Commands verify that the class must be a `Command` and that the method requested is defined as a public method; however, this isn't robust enough to guard against all unwanted code execution. The library should more strictly enforce which methods are considered safe before allowing them to be executed. This issue has been addressed in versions 0.1.3, and 0.2.2. Users are advised to upgrade. Users unable to upgrade should see the repository GHSA for workaround advice.
Published: 2024-03-14
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-0965 turbo_boost-commands is a set of commands to help you build robust reactive applications with Rails & Hotwire. TurboBoost Commands has existing protections in place to guarantee that only public methods on Command classes can be invoked; however, the existing checks aren't as robust as they should be. It's possible for a sophisticated attacker to invoke more methods than should be permitted depending on the the strictness of authorization checks that individual applications enforce. Being able to call some of these methods can have security implications. Commands verify that the class must be a `Command` and that the method requested is defined as a public method; however, this isn't robust enough to guard against all unwanted code execution. The library should more strictly enforce which methods are considered safe before allowing them to be executed. This issue has been addressed in versions 0.1.3, and 0.2.2. Users are advised to upgrade. Users unable to upgrade should see the repository GHSA for workaround advice.
Github GHSA Github GHSA GHSA-mp76-7w5v-pr75 TurboBoost Commands vulnerable to arbitrary method invocation
History

Fri, 05 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Turboboost Commands Project
Turboboost Commands Project turboboost Commands
CPEs cpe:2.3:a:turboboost_commands_project:turboboost_commands:*:*:*:*:*:*:*:*
Vendors & Products Turboboost Commands Project
Turboboost Commands Project turboboost Commands

Subscriptions

Turboboost Commands Project Turboboost Commands
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T00:48:49.558Z

Reserved: 2024-03-06T17:35:00.857Z

Link: CVE-2024-28181

cve-icon Vulnrichment

Updated: 2024-08-02T00:48:49.558Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-14T18:15:07.107

Modified: 2025-12-05T15:52:33.313

Link: CVE-2024-28181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses