-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Vulnerable Library - rails-3.0.7.gem
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
Library home page: https://rubygems.org/gems/rails-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rails-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Vulnerabilities
| CVE | Severity | Dependency | Type | Fixed in (rails version) | Remediation Available | |
|---|---|---|---|---|---|---|
| CVE-2022-30123 | 10.0 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2013-0277 | 9.8 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2022-32224 | 9.8 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2023-22794 | 8.8 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2020-8161 | 8.6 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2022-31163 | 8.1 | tzinfo-0.3.27.gem | Transitive | N/A* | ❌ | |
| CVE-2020-8184 | 7.5 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2021-22885 | 7.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2022-44566 | 7.5 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2019-5418 | 7.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2023-22792 | 7.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2023-22795 | 7.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2023-22796 | 7.5 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2016-0752 | 7.5 | rails-3.0.7.gem | Direct | 3.2.22.1,4.1.14.1,4.2.5.1,5.0.0.beta1.1 | ✅ | |
| CVE-2016-0751 | 7.5 | detected in multiple dependencies | Direct | 3.2.22.1,4.1.14.1,4.2.5.1,5.0.0.beta1.1 | ✅ | |
| CVE-2022-30122 | 7.5 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2014-10077 | 7.5 | i18n-0.5.0.gem | Transitive | N/A* | ❌ | |
| CVE-2023-27539 | 7.5 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2013-0156 | 7.3 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-2695 | 7.3 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-6496 | 7.3 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2011-2930 | 7.3 | rails-3.0.7.gem | Direct | 2.3.13,3.0.10,3.1.0.rc5 | ✅ | |
| CVE-2016-2098 | 7.3 | detected in multiple dependencies | Transitive | N/A* | ✅ | |
| CVE-2013-0333 | 7.3 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2014-3482 | 7.3 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-2140 | 7.3 | mail-2.2.19.gem | Transitive | N/A* | ❌ | |
| CVE-2013-6417 | 6.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-3221 | 6.5 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-0155 | 6.5 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-2660 | 6.5 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2020-8167 | 6.5 | rails-3.0.7.gem | Direct | 6.0.3.1,5.2.4.3 | ✅ | |
| CVE-2010-3299 | 6.5 | rails-3.0.7.gem | Direct | rails - 5.2.0.beta1 | ✅ | |
| CVE-2020-8130 | 6.4 | rake-0.9.0.gem | Transitive | N/A* | ❌ | |
| CVE-2018-16471 | 6.1 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2016-6316 | 6.1 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2015-9097 | 6.1 | mail-2.2.19.gem | Transitive | N/A* | ❌ | |
| CVE-2023-28120 | 6.1 | rails-3.0.7.gem | Direct | rails - 6.1.7.3,7.0.4.3 | ✅ | |
| CVE-2019-16782 | 5.9 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2022-23633 | 5.9 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-0263 | 5.6 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2022-3704 | 5.4 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2014-7829 | 5.3 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-6414 | 5.3 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| WS-2017-0283 | 5.3 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2012-3424 | 5.3 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-2139 | 5.3 | mail-2.2.19.gem | Transitive | N/A* | ❌ | |
| CVE-2011-5036 | 5.3 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2015-3227 | 5.3 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2015-3225 | 5.3 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2012-2661 | 5.3 | activerecord-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2016-2097 | 5.3 | rails-3.0.7.gem | Direct | 3.2.22.2,4.1.14.2 | ✅ | |
| CVE-2011-2929 | 5.3 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2014-0082 | 5.3 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-1856 | 4.8 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2011-2197 | 3.7 | rails-3.0.7.gem | Direct | 2.3.12,3.0.8,3.1.0.rc2 | ✅ | |
| CVE-2013-6415 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-3463 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-3465 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-3464 | 3.7 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2014-7818 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2015-3226 | 3.7 | activesupport-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-1855 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-1857 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2012-1098 | 3.7 | rails-3.0.7.gem | Direct | 3.0.12,3.1.4,3.2.2 | ✅ | |
| CVE-2011-2932 | 3.7 | rails-3.0.7.gem | Direct | 2.3.13,3.0.10,3.1.0.rc5 | ✅ | |
| CVE-2011-2931 | 3.7 | rails-3.0.7.gem | Direct | 2.3.13,3.0.10,3.1.0.rc5 | ✅ | |
| CVE-2012-1099 | 3.7 | rails-3.0.7.gem | Direct | 3.0.12,3.1.4,3.2.2 | ✅ | |
| CVE-2012-6109 | 3.7 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2011-4319 | 3.7 | rails-3.0.7.gem | Direct | 3.0.11,3.1.2 | ✅ | |
| CVE-2013-4491 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-4492 | 3.7 | i18n-0.5.0.gem | Transitive | N/A* | ❌ | |
| CVE-2014-0130 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2015-7576 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-0184 | 3.7 | rack-1.2.3.gem | Transitive | N/A* | ❌ | |
| CVE-2014-0081 | 3.7 | actionpack-3.0.7.gem | Transitive | N/A* | ❌ | |
| CVE-2013-4389 | 3.7 | rails-3.0.7.gem | Direct | 3.2.15 | ✅ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
Details
Partial details (18 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.
CVE-2022-30123
Vulnerable Library - rack-1.2.3.gem
Rack provides minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Also see http://rack.rubyforge.org.
Library home page: https://rubygems.org/gems/rack-1.2.3.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rack-1.2.3.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- actionpack-3.0.7.gem
- ❌ rack-1.2.3.gem (Vulnerable Library)
- actionpack-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.
Publish Date: 2022-12-05
URL: CVE-2022-30123
CVSS 3 Score Details (10.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-wq4h-7r42-5hrr
Release Date: 2022-12-05
Fix Resolution: rack - 2.0.9.1,2.1.4.1,2.2.3.1
CVE-2013-0277
Vulnerable Library - activerecord-3.0.7.gem
Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.
Library home page: https://rubygems.org/gems/activerecord-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/activerecord-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ activerecord-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
Publish Date: 2013-02-13
URL: CVE-2013-0277
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2013-0277
Release Date: 2013-02-13
Fix Resolution: 2.3.17,3.1.0
CVE-2022-32224
Vulnerable Library - activerecord-3.0.7.gem
Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.
Library home page: https://rubygems.org/gems/activerecord-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/activerecord-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ activerecord-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE.
Publish Date: 2022-12-05
URL: CVE-2022-32224
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-3hhc-qp5v-9p2j
Release Date: 2022-12-05
Fix Resolution: activerecord - 5.2.8.1,6.0.5.1,6.1.6.1,7.0.3.1
CVE-2023-22794
Vulnerable Library - activerecord-3.0.7.gem
Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.
Library home page: https://rubygems.org/gems/activerecord-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/activerecord-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ activerecord-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 related to the sanitization of comments. If malicious user input is passed to either the annotate query method, the optimizer_hints query method, or through the QueryLogs interface which automatically adds annotations, it may be sent to the database withinsufficient sanitization and be able to inject SQL outside of the comment.
Publish Date: 2023-02-09
URL: CVE-2023-22794
CVSS 3 Score Details (8.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-hq7p-j377-6v63
Release Date: 2023-01-06
Fix Resolution: activerecord - 6.0.6.1,6.1.7.1,7.0.4.1
CVE-2020-8161
Vulnerable Library - rack-1.2.3.gem
Rack provides minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Also see http://rack.rubyforge.org.
Library home page: https://rubygems.org/gems/rack-1.2.3.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rack-1.2.3.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- actionpack-3.0.7.gem
- ❌ rack-1.2.3.gem (Vulnerable Library)
- actionpack-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
Publish Date: 2020-07-02
URL: CVE-2020-8161
CVSS 3 Score Details (8.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2020-07-02
Fix Resolution: 2.2.0,2.1.3
CVE-2022-31163
Vulnerable Library - tzinfo-0.3.27.gem
TZInfo is a Ruby library that uses the standard tz (Olson) database to provide daylight savings aware transformations between times in different time zones.
Library home page: https://rubygems.org/gems/tzinfo-0.3.27.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/tzinfo-0.3.27.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- activerecord-3.0.7.gem
- ❌ tzinfo-0.3.27.gem (Vulnerable Library)
- activerecord-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with require on demand. In the affected versions, TZInfo::Timezone.get fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, TZInfo::Timezone.get can be made to load unintended files with require, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of tzinfo/definition within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to TZInfo::Timezone.get by ensuring it matches the regular expression \A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z.
Publish Date: 2022-07-22
URL: CVE-2022-31163
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-5cm2-9h8c-rvfx
Release Date: 2022-07-22
Fix Resolution: tzinfo - 0.3.61,1.2.10
CVE-2020-8184
Vulnerable Library - rack-1.2.3.gem
Rack provides minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Also see http://rack.rubyforge.org.
Library home page: https://rubygems.org/gems/rack-1.2.3.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rack-1.2.3.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- actionpack-3.0.7.gem
- ❌ rack-1.2.3.gem (Vulnerable Library)
- actionpack-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A reliance on cookies without validation/integrity check security vulnerability exists in rack < 2.2.3, rack < 2.1.4 that makes it is possible for an attacker to forge a secure or host-only cookie prefix.
Publish Date: 2020-06-19
URL: CVE-2020-8184
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://groups.google.com/forum/#!topic/rubyonrails-security/OWtmozPH9Ak
Release Date: 2020-06-19
Fix Resolution: rack - 2.1.4, 2.2.3
CVE-2021-22885
Vulnerable Library - actionpack-3.0.7.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ actionpack-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the redirect_to or polymorphic_urlhelper with untrusted user input.
Publish Date: 2021-05-27
URL: CVE-2021-22885
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-hjg4-8q5f-x6fm
Release Date: 2021-05-27
Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2
CVE-2022-44566
Vulnerable Library - activerecord-3.0.7.gem
Databases on Rails. Build a persistent domain model by mapping database tables to Ruby classes. Strong conventions for associations, validations, aggregations, migrations, and testing come baked-in.
Library home page: https://rubygems.org/gems/activerecord-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/activerecord-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ activerecord-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A denial of service vulnerability present in ActiveRecord's PostgreSQL adapter <7.0.4.1 and <6.1.7.1. When a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service.
Publish Date: 2023-02-09
URL: CVE-2022-44566
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-579w-22j4-4749
Release Date: 2022-11-02
Fix Resolution: activerecord - 6.1.7.1,7.0.4.1
CVE-2019-5418
Vulnerable Library - actionpack-3.0.7.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ actionpack-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
Publish Date: 2019-03-27
URL: CVE-2019-5418
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/
Release Date: 2019-03-27
Fix Resolution: 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1
CVE-2023-22792
Vulnerable Library - actionpack-3.0.7.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ actionpack-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A regular expression based DoS vulnerability in Action Dispatch <6.0.6.1,< 6.1.7.1, and <7.0.4.1. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Publish Date: 2023-02-09
URL: CVE-2023-22792
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2023-01-06
Fix Resolution: actionpack - 6.1.7.1,7.0.4.1
CVE-2023-22795
Vulnerable Library - actionpack-3.0.7.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ actionpack-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately.
Publish Date: 2023-02-09
URL: CVE-2023-22795
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2023-01-06
Fix Resolution: actionpack - 6.1.7.1, 7.0.4.1
CVE-2023-22796
Vulnerable Library - activesupport-3.0.7.gem
A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.
Library home page: https://rubygems.org/gems/activesupport-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/activesupport-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ activesupport-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.
Publish Date: 2023-02-09
URL: CVE-2023-22796
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-j6gc-792m-qgm2
Release Date: 2023-01-06
Fix Resolution: activesupport - 6.1.7.1,7.0.4.1
CVE-2016-0752
Vulnerable Library - rails-3.0.7.gem
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
Library home page: https://rubygems.org/gems/rails-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rails-3.0.7.gem
Dependency Hierarchy:
- ❌ rails-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Publish Date: 2016-02-16
URL: CVE-2016-0752
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-0752
Release Date: 2016-02-16
Fix Resolution: 3.2.22.1,4.1.14.1,4.2.5.1,5.0.0.beta1.1
⛑️ Automatic Remediation is available for this issue
CVE-2016-0751
Vulnerable Libraries - rails-3.0.7.gem, actionpack-3.0.7.gem
rails-3.0.7.gem
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
Library home page: https://rubygems.org/gems/rails-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rails-3.0.7.gem
Dependency Hierarchy:
- ❌ rails-3.0.7.gem (Vulnerable Library)
actionpack-3.0.7.gem
Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.
Library home page: https://rubygems.org/gems/actionpack-3.0.7.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-3.0.7.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- ❌ actionpack-3.0.7.gem (Vulnerable Library)
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
Publish Date: 2016-02-16
URL: CVE-2016-0751
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-0751
Release Date: 2016-02-16
Fix Resolution: 3.2.22.1,4.1.14.1,4.2.5.1,5.0.0.beta1.1
⛑️ Automatic Remediation is available for this issue
CVE-2022-30122
Vulnerable Library - rack-1.2.3.gem
Rack provides minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Also see http://rack.rubyforge.org.
Library home page: https://rubygems.org/gems/rack-1.2.3.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rack-1.2.3.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- actionpack-3.0.7.gem
- ❌ rack-1.2.3.gem (Vulnerable Library)
- actionpack-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack.
Publish Date: 2022-12-05
URL: CVE-2022-30122
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: GHSA-hxqx-xwvh-44m2
Release Date: 2022-12-05
Fix Resolution: rack - 2.0.9.1,2.1.4.1,2.2.3.1
CVE-2014-10077
Vulnerable Library - i18n-0.5.0.gem
New wave Internationalization support for Ruby.
Library home page: https://rubygems.org/gems/i18n-0.5.0.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/i18n-0.5.0.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- activeresource-3.0.7.gem
- activemodel-3.0.7.gem
- ❌ i18n-0.5.0.gem (Vulnerable Library)
- activemodel-3.0.7.gem
- activeresource-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0 for Ruby allows remote attackers to cause a denial of service (application crash) via a call in a situation where :some_key is present in keep_keys but not present in the hash.
Publish Date: 2018-11-06
URL: CVE-2014-10077
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-10077
Release Date: 2018-11-06
Fix Resolution: 0.8.0
CVE-2023-27539
Vulnerable Library - rack-1.2.3.gem
Rack provides minimal, modular and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Also see http://rack.rubyforge.org.
Library home page: https://rubygems.org/gems/rack-1.2.3.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/rack-1.2.3.gem
Dependency Hierarchy:
- rails-3.0.7.gem (Root Library)
- actionpack-3.0.7.gem
- ❌ rack-1.2.3.gem (Vulnerable Library)
- actionpack-3.0.7.gem
Found in HEAD commit: 6a8b51e8d037991ce7512dd0fed57c9ccb449a57
Found in base branch: main
Vulnerability Details
There is a denial of service vulnerability in the header parsing component of Rack. Carefully crafted input can cause header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse headers using Rack (virtually all Rails applications) are impacted. The issue is fixed versions 2.2.6.4 and 3.0.6.1
Publish Date: 2023-03-03
URL: CVE-2023-27539
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2023-03-03
Fix Resolution: rack - 2.2.6.4,3.0.6.1
⛑️ Automatic Remediation is available for this issue.