CVE-2024-32464

Severity
6.1MEDIUM
EPSS
0.3%
top 48.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 4
Latest updateJun 30

Description

Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

RubyGemsactiontext7.1.07.1.3.4+1
NVDrubyonrails/rails7.1.07.1.3.4+1
CVEListV5rails/rails= 7.2.0.beta1, >= 7.1.0, < 7.1.3.4+1

Patches

🔴Vulnerability Details

4
OSV
ActionText ContentAttachment can Contain Unsanitized HTML2024-06-04
CVEList
ActionText ContentAttachment can Contain Unsanitized HTML2024-06-04
OSV
CVE-2024-32464: Action Text brings rich text content and editing to Rails2024-06-04
GHSA
ActionText ContentAttachment can Contain Unsanitized HTML2024-06-04

📋Vendor Advisories

1
Debian
CVE-2024-32464: rails - Action Text brings rich text content and editing to Rails. Instances of ActionTe...2024

💬Community

1
HackerOne
[CVE-2024-32464] ActionText ContentAttachment’s can Contain Unsanitized HTML2024-06-30