ELA-1301-1 rails security update

multiple vulnerabilities

2025-01-24
Packagerails
Version2:4.2.7.1-1+deb9u6 (stretch)
Related CVEs CVE-2022-27777 CVE-2023-22792 CVE-2023-22795 CVE-2023-22796 CVE-2023-28120


Multiple vunerabilities were discovered in rails, the Ruby based server-side MVC web application framework, which could result in XSS, data disclosure and open redirect.

CVE-2022-27777

A XSS Vulnerability in Action View tag helpers which would allow an attacker to inject content if able to control input into specific attributes.

CVE-2023-22792

A regular expression based DoS vulnerability in Action Dispatch. Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVE-2023-22795

A regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking, when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVE-2023-22796

A regular expression based DoS vulnerability in Active Support. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

CVE-2023-28120

A vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.



For Debian 9 stretch, these problems have been fixed in version 2:4.2.7.1-1+deb9u6.

We recommend that you upgrade your rails packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.