File tree Expand file tree Collapse file tree 1 file changed +34
-0
lines changed Expand file tree Collapse file tree 1 file changed +34
-0
lines changed Original file line number Diff line number Diff line change
1
+ ---
2
+ gem : actionpack
3
+ framework : rails
4
+ cve : 2023-28362
5
+ url : https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132
6
+ title : Possible XSS via User Supplied Values to redirect_to
7
+ date : 2023-06-26
8
+ description : |
9
+ The redirect_to method in Rails allows provided values to contain characters
10
+ which are not legal in an HTTP header value. This results in the potential for
11
+ downstream services which enforce RFC compliance on HTTP response headers to
12
+ remove the assigned Location header. This vulnerability has been assigned the
13
+ CVE identifier CVE-2023-28362.
14
+
15
+ Versions Affected: All. Not affected: None Fixed Versions: 7.0.5.1, 6.1.7.4
16
+
17
+ # Impact
18
+
19
+ This introduces the potential for a Cross-site-scripting (XSS) payload to be
20
+ delivered on the now static redirection page. Note that this both requires
21
+ user interaction and for a Rails app to be configured to allow redirects to
22
+ external hosts (defaults to false in Rails >= 7.0.x).
23
+
24
+ # Releases
25
+
26
+ The FIXED releases are available at the normal locations.
27
+
28
+ # Workarounds
29
+
30
+ Avoid providing user supplied URLs with arbitrary schemes to the redirect_to
31
+ method.
32
+ patched_versions :
33
+ - " ~> 6.1.7.4"
34
+ - " >= 7.0.5.1"
You can’t perform that action at this time.
0 commit comments