Actionpack Project Actionpack vulnerabilities
63 known vulnerabilities affecting actionpack_project/actionpack.
Total CVEs
63
CISA KEV
2
actively exploited
Public exploits
7
Exploited in wild
2
Severity breakdown
CRITICAL1HIGH16MEDIUM42LOW4
Vulnerabilities
Page 1 of 4
CVE-2026-33167LOW≥ 8.1.0, < 8.1.2.12026-03-23
CVE-2026-33167 [LOW] CWE-79 Rails has a possible XSS vulnerability in its Action Pack debug exceptions
Rails has a possible XSS vulnerability in its Action Pack debug exceptions
### Impact
The debug exceptions page does not properly escape exception messages. A carefully crafted exception message could inject arbitrary HTML and JavaScript into the page, leading to XSS. This affects applications with detailed exception pages enabled (`config.consider_all_requests_local = true`), which is the def
ghsaosv
CVE-2024-54133LOW≥ 5.2.0, < 7.0.8.7≥ 7.1.0, < 7.1.5.1+2 more2024-12-10
CVE-2024-54133 [LOW] CWE-79 Possible Content Security Policy bypass in Action Dispatch
Possible Content Security Policy bypass in Action Dispatch
There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper in Action Pack.
Impact
Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of th
ghsaosv
CVE-2024-47887MEDIUMCVSS 6.6≥ 4.0.0, < 6.1.7.9≥ 7.0.0, < 7.0.8.5+2 more2024-10-15
CVE-2024-47887 [MEDIUM] CWE-1333 Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
Possible ReDoS vulnerability in HTTP Token authentication in Action Controller
There is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. This vulnerability has been assigned the CVE identifier CVE-2024-47887.
Impact
For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may
ghsaosv
CVE-2024-41128MEDIUMCVSS 6.6≥ 3.1.0, < 6.1.7.9≥ 7.0.0, < 7.0.8.5+2 more2024-10-15
CVE-2024-41128 [MEDIUM] CWE-770 Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
Possible ReDoS vulnerability in query parameter filtering in Action Dispatch
There is a possible ReDoS vulnerability in the query parameter filtering routines of Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2024-41128.
Impact
Carefully crafted query parameters can cause query parameter filtering to take an unexpected amount of time, possibly resulting in
ghsaosv
CVE-2024-28103CRITICALCVSS 9.8≥ 6.1.0, < 6.1.7.8≥ 7.0.0, < 7.0.8.4+2 more2024-06-04
CVE-2024-28103 [CRITICAL] CWE-20 Missing security headers in Action Pack on non-HTML responses
Missing security headers in Action Pack on non-HTML responses
# Permissions-Policy is Only Served on HTML Content-Type
The application configurable Permissions-Policy is only served on responses
with an HTML related Content-Type.
This has been assigned the CVE identifier CVE-2024-28103.
Versions Affected: >= 6.1.0
Not affected: < 6.1.0
Fixed Versions: 6.1.7.8, 7.0.8.4, and 7.1.3.4
Impact
Response
ghsaosv
CVE-2024-26142HIGHCVSS 7.5≥ 7.1.0, < 7.1.3.12024-02-27
CVE-2024-26142 [HIGH] CWE-1333 Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch
Rails has possible ReDoS vulnerability in Accept header parsing in Action Dispatch
# Possible ReDoS vulnerability in Accept header parsing in Action Dispatch
There is a possible ReDoS vulnerability in the Accept header parsing routines
of Action Dispatch. This vulnerability has been assigned the CVE identifier
CVE-2024-26142.
Versions Affected: >= 7.1.0, < 7.1.3.1
Not affected: <
ghsaosv
CVE-2024-26143MEDIUMCVSS 6.1≥ 7.0.0, < 7.0.8.1≥ 7.1.0, < 7.1.3.12024-02-27
CVE-2024-26143 [MEDIUM] CWE-79 Rails has possible XSS Vulnerability in Action Controller
Rails has possible XSS Vulnerability in Action Controller
# Possible XSS Vulnerability in Action Controller
There is a possible XSS vulnerability when using the translation helpers
(`translate`, `t`, etc) in Action Controller. This vulnerability has been
assigned the CVE identifier CVE-2024-26143.
Versions Affected: >= 7.0.0.
Not affected: < 7.0.0
Fixed Versions: 7.1.3.1, 7.0.8.1
Impact
Applications usin
ghsaosv
CVE-2023-28362MEDIUMCVSS 4.0≥ 0, < 6.1.7.4≥ 7.0.0, < 7.0.5.12023-06-29
CVE-2023-28362 [MEDIUM] CWE-116 Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location heade
ghsaosv
CVE-2023-22797MEDIUMCVSS 6.1≥ 7.0.0, < 7.0.4.12023-02-09
CVE-2023-22797 [MEDIUM] CWE-601 CVE-2023-22797: An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redire
An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an
ghsanvdosv
CVE-2023-22795HIGHCVSS 7.5≥ 4.0.0.beta1, < 6.1.7.1≥ 7.0.0, < 7.0.4.12023-01-18
CVE-2023-22795 [HIGH] CWE-1333 ReDoS based DoS vulnerability in Action Dispatch
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch related to the If-None-Match header. This vulnerability has been assigned the CVE identifier CVE-2023-22795.
Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1
Impact
A specially crafted HTTP If-None-Match header can cause the regular expr
ghsaosv
CVE-2023-22792HIGHCVSS 7.5≥ 3.0.0, < 5.2.8.15≥ 6.0.0, < 6.1.7.1+1 more2023-01-18
CVE-2023-22792 [HIGH] CWE-1333 ReDoS based DoS vulnerability in Action Dispatch
ReDoS based DoS vulnerability in Action Dispatch
There is a possible regular expression based DoS vulnerability in Action Dispatch. This vulnerability has been assigned the CVE identifier CVE-2023-22792.
Versions Affected: >= 3.0.0 Not affected: < 3.0.0 Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1
Impact
Specially crafted cookies, in combination with a specially crafted X_FORWARDED_HOST header can cause
ghsaosv
CVE-2022-3704LOW≥ 0, ≤ 7.0.42022-10-27
CVE-2022-3704 [LOW] CWE-707 Cross-site Scripting in actionpack
Cross-site Scripting in actionpack
actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this [commit](https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4).
This vulnerability is disputed by the Rails security team. It requires that the developer is tricked into copy pasting a malicious javascript-containing string into a
ghsa
CVE-2022-22577MEDIUMCVSS 6.1≥ 5.2.0, < 5.2.7.1≥ 6.0.0, < 6.0.4.8+2 more2022-04-27
CVE-2022-22577 [MEDIUM] CWE-79 Cross-site Scripting Vulnerability in Action Pack
Cross-site Scripting Vulnerability in Action Pack
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been
assigned the CVE identifier CVE-2022-22577.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
CSP headers were only sent along with responses that Rails considered as
"HTML" responses. This left API requests withou
ghsaosv
CVE-2011-1497MEDIUM≥ 3.0.0.rc, < 3.0.62022-04-22
CVE-2011-1497 [MEDIUM] CWE-79 Cross site scripting in actionpack Rubygem
Cross site scripting in actionpack Rubygem
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6.
ghsaosv
CVE-2022-23633HIGH≥ 5.0.0.0, < 5.2.6.2≥ 6.0.0.0, < 6.0.4.6+2 more2022-02-11
CVE-2022-23633 [HIGH] CWE-200 Exposure of information in Action Pack
Exposure of information in Action Pack
### Impact
Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, esp
ghsaosv
CVE-2021-44528MEDIUMCVSS 6.1PoC≥ 6.0.0, < 6.0.4.2≥ 6.1.0, < 6.1.4.22021-12-14
CVE-2021-44528 [MEDIUM] CWE-601 actionpack Open Redirect in Host Authorization Middleware
actionpack Open Redirect in Host Authorization Middleware
Specially crafted "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this:
```
config.hosts << '.EXAMPLE.co
ghsaosv
CVE-2021-22942MEDIUMCVSS 6.1≥ 6.0.0, < 6.0.4.1≥ 6.1.0, < 6.1.4.12021-08-26
CVE-2021-22942 [MEDIUM] CWE-601 Open Redirect in ActionPack
Open Redirect in ActionPack
# Overview
There is a possible open redirect vulnerability in the Host Authorization middleware in Action Pack. This vulnerability has been assigned the CVE identifier CVE-2021-22942.
Versions Affected: >= 6.0.0.
Not affected: < 6.0.0
Fixed Versions: 6.1.4.1, 6.0.4.1
# Impact
Specially crafted “X-Forwarded-Host” headers in combination with certain “allowed host” formats can cause the Host Authorization m
ghsaosv
CVE-2021-22885HIGH≥ 6.0.0, < 6.0.3.7≥ 6.1.0, < 6.1.3.2+2 more2021-05-05
CVE-2021-22885 [HIGH] CWE-200 Action Pack contains Information Disclosure / Unintended Method Execution vulnerability
Action Pack contains Information Disclosure / Unintended Method Execution vulnerability
Impact
There is a possible information disclosure / unintended method execution vulnerability in Action Pack when using the `redirect_to` or `polymorphic_url` helper with untrusted user input.
Vulnerable code will look like this.
```
redirect_to(params[:some_param])
```
All users running a
ghsaosv
CVE-2021-22902HIGH≥ 6.0.0, < 6.0.3.7≥ 6.1.0, < 6.1.3.22021-05-05
CVE-2021-22902 [HIGH] CWE-400 Denial of Service in Action Dispatch
Denial of Service in Action Dispatch
Impact
There is a possible Denial of Service vulnerability in Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
Releases
The fixed releases are available at the normal locations.
Workarounds
The following monkey patch placed in an initializer can be used to work around the iss
ghsaosv
CVE-2021-22904HIGH≥ 6.0.0, < 6.0.3.7≥ 6.1.0, < 6.1.3.2+2 more2021-05-05
CVE-2021-22904 [HIGH] CWE-400 Possible DoS Vulnerability in Action Controller Token Authentication
Possible DoS Vulnerability in Action Controller Token Authentication
There is a possible DoS vulnerability in the Token Authentication logic in Action Controller.
Versions Affected: >= 4.0.0
Not affected: < 4.0.0
Fixed Versions: 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6
Impact
Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication. Impact
ghsaosv
1 / 4Next →