Actionpack Project Actionpack vulnerabilities
63 known vulnerabilities affecting actionpack_project/actionpack.
Total CVEs
63
CISA KEV
2
actively exploited
Public exploits
7
Exploited in wild
2
Severity breakdown
CRITICAL1HIGH16MEDIUM42LOW4
Vulnerabilities
Page 2 of 4
CVE-2021-22903MEDIUMCVSS 6.1≥ 6.1.0.rc2, < 6.1.3.22021-05-05
CVE-2021-22903 [MEDIUM] CWE-601 Possible Open Redirect Vulnerability in Action Pack
Possible Open Redirect Vulnerability in Action Pack
There is a possible Open Redirect Vulnerability in Action Pack.
Versions Affected: >= v6.1.0.rc2
Not affected: < v6.1.0.rc2
Fixed Versions: 6.1.3.2
Impact
This is similar to CVE-2021-22881. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicio
ghsaosv
CVE-2020-8264MEDIUM≥ 6.0.0, < 6.0.3.42021-04-07
CVE-2020-8264 [MEDIUM] CWE-79 Cross-site scripting in actionpack
Cross-site scripting in actionpack
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
Workarounds
Until such time as the patch can be
ghsaosv
CVE-2021-22881MEDIUMPoC≥ 6.0.0, < 6.0.3.5≥ 6.1.0, < 6.1.2.12021-03-02
CVE-2021-22881 [MEDIUM] CWE-601 Actionpack Open Redirect Vulnerability
Actionpack Open Redirect Vulnerability
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
ghsaosv
CVE-2020-8185MEDIUMCVSS 6.5≥ 6.0.0, < 6.0.3.22020-06-24
CVE-2020-8185 [MEDIUM] CWE-400 Untrusted users can run pending migrations in production in Rails
Untrusted users can run pending migrations in production in Rails
There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
This vulnerability has been assigned the CVE identifier CVE-2020-8185.
Versions Affected: 6.0.0 = 6.0.3.2
Impact
Using this issue, an attacker would be able to execute an
ghsaosv
CVE-2020-8164HIGH≥ 5.0.0, < 5.2.4.3≥ 6.0.0, < 6.0.3.12020-05-26
CVE-2020-8164 [HIGH] CWE-502 Possible Strong Parameters Bypass in ActionPack
Possible Strong Parameters Bypass in ActionPack
There is a strong parameters bypass vector in ActionPack.
Versions Affected: rails = 5.2.4.3, rails >= 6.0.3.1
Impact
In some cases user supplied information can be inadvertently leaked from
Strong Parameters. Specifically the return value of `each`, or `each_value`,
or `each_pair` will return the underlying "untrusted" hash of data that was
read from the parameters. Ap
ghsaosv
CVE-2020-8166MEDIUM≥ 5.0.0, < 5.2.4.3≥ 6.0.0, < 6.0.3.12020-05-26
CVE-2020-8166 [MEDIUM] CWE-352 Ability to forge per-form CSRF tokens in Rails
Ability to forge per-form CSRF tokens in Rails
It is possible to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token for any action for that session.
Impact
Given the ability to extract the global CSRF token, an attacker would be able to construct a per-form CSRF token for that session.
Workarounds
This is a low-severity security issue. As such, no wor
ghsaosv
CVE-2016-0752HIGHKEVPoC≥ 4.0.0, < 4.1.14.1≥ 4.2.0, < 4.2.5.1+1 more2017-10-24
CVE-2016-0752 [HIGH] CWE-22 Directory traversal vulnerability in Action View in Ruby on Rails
Directory traversal vulnerability in Action View in Ruby on Rails
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a `..` (dot dot) in a pathname.
ghsaosv
CVE-2016-0751HIGH≥ 4.2.0, < 4.2.5.1≥ 0, < 3.2.22.1+1 more2017-10-24
CVE-2016-0751 [HIGH] actionpack is vulnerable to denial of service via a crafted HTTP Accept header
actionpack is vulnerable to denial of service via a crafted HTTP Accept header
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via
ghsaosv
CVE-2016-2097HIGHCVSS 7.5≥ 3.0.0, < 3.2.22.2≥ 4.0.0, < 4.1.14.22017-10-24
CVE-2016-2097 [HIGH] CWE-22 actionview contains Path Traversal vulnerability
actionview contains Path Traversal vulnerability
There is a possible directory traversal and information leak vulnerability in Action View. This was meant to be fixed on CVE-2016-0752. However the 3.2 patch was not covering all possible scenarios. This vulnerability has been assigned the CVE identifier CVE-2016-2097.
Versions Affected: 3.2.x, 4.0.x, 4.1.x
Not affected: 4.2+
Fixed Versions: 3.2.22.2, 4.1.14.2
Impact
A
ghsaosv
CVE-2015-7581HIGH≥ 4.0.0, < 4.2.5.12017-10-24
CVE-2015-7581 [HIGH] actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack is vulnerable to denial of service because of a wildcard controller route
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
ghsaosv
CVE-2011-0449HIGH≥ 3.0.0, < 3.0.42017-10-24
CVE-2011-0449 [HIGH] actionpack allows remote attackers to bypass intended access restrictions
actionpack allows remote attackers to bypass intended access restrictions
`actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended ca
ghsaosv
CVE-2016-2098HIGHPoC≥ 3.0.0, < 3.2.22.2≥ 4.0.0, < 4.1.14.2+1 more2017-10-24
CVE-2016-2098 [HIGH] CWE-20 actionpack allows remote code execution via application's unrestricted use of render method
actionpack allows remote code execution via application's unrestricted use of render method
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
ghsaosv
CVE-2014-0130HIGHKEV≥ 3.0.0, < 3.2.18≥ 4.0.0, < 4.0.5+1 more2017-10-24
CVE-2014-0130 [HIGH] CWE-22 actionpack Path Traversal vulnerability
actionpack Path Traversal vulnerability
Directory traversal vulnerability in `actionpack/lib/abstract_controller/base.rb` in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
ghsaosv
CVE-2013-0156HIGHPoC≥ 0, < 2.3.15≥ 3.0.0, < 3.0.19+2 more2017-10-24
CVE-2013-0156 [HIGH] CWE-20 actionpack Improper Input Validation vulnerability
actionpack Improper Input Validation vulnerability
`active_support/core_ext/hash/conversions.rb` in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML e
ghsaosv
CVE-2011-2197MEDIUM≥ 2.0.0, < 2.3.12≥ 3.0.0, < 3.0.82017-10-24
CVE-2011-2197 [MEDIUM] CWE-79 rails Cross-site Scripting vulnerability
rails Cross-site Scripting vulnerability
The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method.
ghsaosv
CVE-2013-1857MEDIUM≥ 0, < 2.3.18≥ 3.0.0, < 3.1.12+1 more2017-10-24
CVE-2013-1857 [MEDIUM] CWE-79 actionpack Cross-site Scripting vulnerability
actionpack Cross-site Scripting vulnerability
The sanitize helper in `lib/action_controller/vendor/html-scanner/html/sanitizer.rb` in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded `:` (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme n
ghsaosv
CVE-2009-3009MEDIUM≥ 2.0.0, < 2.2.3≥ 2.3.0, < 2.3.42017-10-24
CVE-2009-3009 [MEDIUM] CWE-79 Cross site scripting that affects rails
Cross site scripting that affects rails
Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
ghsaosv
CVE-2011-0447MEDIUMCVSS 6.8≥ 2.1.0, < 2.3.11≥ 3.0.0, < 3.0.42017-10-24
CVE-2011-0447 [MEDIUM] CWE-352 actionpack Cross-Site Request Forgery vulnerability
actionpack Cross-Site Request Forgery vulnerability
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a r
ghsaosv
CVE-2011-2929MEDIUM≥ 3.0.0, < 3.0.102017-10-24
CVE-2011-2929 [MEDIUM] CWE-20 actionpack Improper Input Validation vulnerability
actionpack Improper Input Validation vulnerability
The template selection functionality in `actionpack/lib/action_view/template/resolver.rb` in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."
ghsaosv
CVE-2012-3465MEDIUM≥ 3.0.0.beta, < 3.0.17≥ 3.1.0, < 3.1.8+2 more2017-10-24
CVE-2012-3465 [MEDIUM] CWE-79 actionpack Cross-site Scripting vulnerability
actionpack Cross-site Scripting vulnerability
Cross-site scripting (XSS) vulnerability in `actionpack/lib/action_view/helpers/sanitize_helper.rb` in the `strip_tags` helper in Ruby on Rails before 2.3.16, 3.0.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via malformed HTML markup.
ghsaosv