CVE-2022-23633Sensitive Information Exposure in Rails

Severity
5.9MEDIUMNVD
CNA7.4
EPSS
0.4%
top 41.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11

Description

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

RubyGemsactionpack_project/actionpack5.0.0.05.2.6.2+3
NVDrubyonrails/rails5.0.05.2.6.2+3
Debianrubyonrails/rails< 2:6.0.3.7+dfsg-2+deb11u1+3
CVEListV5rails/rails4 versions+3

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

4
CVEList
Exposure of sensitive information in Action Pack2022-02-11
OSV
Exposure of information in Action Pack2022-02-11
GHSA
Exposure of information in Action Pack2022-02-11
OSV
CVE-2022-23633: Action Pack is a framework for handling and responding to web requests2022-02-11

📋Vendor Advisories

2
Red Hat
rubygem-actionpack: information leak between requests2022-02-11
Debian
CVE-2022-23633: rails - Action Pack is a framework for handling and responding to web requests. Under ce...2022
CVE-2022-23633 — Sensitive Information Exposure | cvebase