Skip to content

update vulnerabilities with cvss_v3 from github #480

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jun 22, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions gems/actionpack/CVE-2015-7581.yml
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,8 @@ description: |

Please note that only the 4.1.x and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.

cvss_v3: 7.5

unaffected_versions:
- "< 4.0.0"
- ">= 5.0.0.beta1"
Expand Down
2 changes: 2 additions & 0 deletions gems/actionpack/CVE-2016-2098.yml
Original file line number Diff line number Diff line change
Expand Up @@ -80,6 +80,8 @@ description: |
Thanks to both Tobias Kraze from makandra and joernchen of Phenoelit for
reporting this!

cvss_v3: 7.3

unaffected_versions:
- ">= 5.0.0.beta1"

Expand Down
2 changes: 2 additions & 0 deletions gems/actionpack/CVE-2020-8264.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,8 @@ description: |

`config.middleware.delete ActionDispatch::ActionableExceptions`

cvss_v3: 6.1

unaffected_versions:
- "< 6.0.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/actionpack/CVE-2021-22885.yml
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,8 @@ description: |
end
```

cvss_v3: 7.5

unaffected_versions:
- "< 2.0.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/actionview/CVE-2016-2097.yml
Original file line number Diff line number Diff line change
Expand Up @@ -81,6 +81,8 @@ description: |
Thanks to both Jyoti Singh and Tobias Kraze from makandra for reporting this
and working with us in the patch!

cvss_v3: 5.3

unaffected_versions:
- ">= 4.2.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/actionview/CVE-2019-5418.yml
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,8 @@ description: |
-------
Thanks to John Hawthorn <[email protected]> of GitHub

cvss_v3: 7.5

patched_versions:
- "~> 4.2.11, >= 4.2.11.1"
- "~> 5.0.7, >= 5.0.7.2"
Expand Down
2 changes: 2 additions & 0 deletions gems/actionview/CVE-2019-5419.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,8 @@ description: |
Thanks to John Hawthorn <[email protected]> of GitHub


cvss_v3: 7.5

patched_versions:
- ">= 6.0.0.beta3"
- "~> 5.2.2, >= 5.2.2.1"
Expand Down
2 changes: 2 additions & 0 deletions gems/actionview/CVE-2020-5267.yml
Original file line number Diff line number Diff line change
Expand Up @@ -64,6 +64,8 @@ description: |
end
```

cvss_v3: 4.0

patched_versions:
- "~> 5.2.4, >= 5.2.4.2"
- ">= 6.0.2.2"
2 changes: 2 additions & 0 deletions gems/activejob/CVE-2018-16476.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ description: |
All users running an affected release should either upgrade or use one of the
workarounds immediately.

cvss_v3: 7.5

unaffected_versions:
- "< 4.2.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/activerecord/CVE-2016-6317.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,8 @@ description: |
end
```

cvss_v3: 7.5

unaffected_versions:
- "< 4.2.0"
- ">= 5.0.0"
Expand Down
2 changes: 2 additions & 0 deletions gems/activestorage/CVE-2018-16477.yml
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,8 @@ description: |
end
```

cvss_v3: 6.5

unaffected_versions:
- "< 5.2.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/administrate/CVE-2020-5257.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ description: |
Whilst this does have a high-impact, to exploit this you need access to the
Administrate dashboards, which should generally be behind authentication.

cvss_v3: 7.7

patched_versions:
- ">= 0.13.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/airbrake-ruby/CVE-2019-16060.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ description: |
A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered
prior to sending to Airbrake. Such data could be user passwords. Therefore, an app
could leak user passwords without knowing it.
cvss_v3: 9.8

unaffected_versions:
- "< 4.2.3"
- "> 4.2.3"
Expand Down
2 changes: 2 additions & 0 deletions gems/consul/CVE-2019-16377.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,5 +11,7 @@ description: |
to all power checks in that controller. This can lead to skipped power checks
and hence unauthenticated access to certain controller actions.

cvss_v3: 9.8

patched_versions:
- ">= 1.0.3"
2 changes: 2 additions & 0 deletions gems/devise/CVE-2019-16109.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,5 +9,7 @@ description: |
confirmation_token, if a database record has a blank value in the confirmation_token column.
However, there is no scenario within Devise itself in which such database records would exist.

cvss_v3: 5.3

patched_versions:
- ">= 4.7.1"
2 changes: 2 additions & 0 deletions gems/dragonfly/CVE-2021-33564.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,5 +12,7 @@ description: |
problem occurs because the generate and process features mishandle use of the ImageMagick
convert utility.

cvss_v3: 9.8

patched_versions:
- ">= 1.4.0"
2 changes: 2 additions & 0 deletions gems/ember-source/CVE-2015-7565.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,8 @@ description: |

All users running an affected release should either upgrade or use of
the workarounds immediately.
cvss_v3: 6.1

patched_versions:
- ~> 1.11.4
- ~> 1.12.2
Expand Down
2 changes: 2 additions & 0 deletions gems/excon/CVE-2019-16779.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ description: |-
Users can workaround the problem by disabling persistent connections, though
this may cause performance implications.

cvss_v3: 5.8

patched_versions:
- ">= 0.71.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/field_test/CVE-2019-13146.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@ description: |

landing_page = field_test(:landing_page)
Page.where("key = '#{landing_page}'")
cvss_v3: 5.3

patched_versions:
- ">= 0.3.1"
unaffected_versions:
Expand Down
2 changes: 2 additions & 0 deletions gems/foreman_fog_proxmox/CVE-2021-20259.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,5 +12,7 @@ description: |
and integrity as well as system availability. Versions before foreman_fog_proxmox
0.13.1 are affected

cvss_v3: 7.8

patched_versions:
- ">= 0.13.1"
2 changes: 2 additions & 0 deletions gems/pgsync/CVE-2021-31671.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,5 +23,7 @@ description: |

This applies to both the `to` and `from` connections.

cvss_v3: 7.5

patched_versions:
- ">= 0.6.7"
2 changes: 2 additions & 0 deletions gems/rack/CVE-2019-16782.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@ description: |-
may be able to perform a timing attack to determine an existing session id
and hijack that session.

cvss_v3: 6.3

patched_versions:
- "~> 1.6.12"
- ">= 2.0.8"
2 changes: 2 additions & 0 deletions gems/railties/CVE-2019-5420.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,8 @@ description: |
-------
Thanks to ooooooo_q

cvss_v3: 9.8

unaffected_versions:
- "< 5.2.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/ruby-saml/CVE-2017-11428.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ description: |

cvss_v2: 6.3

cvss_v3: 7.7

patched_versions:
- ">= 1.7.0"

Expand Down
2 changes: 2 additions & 0 deletions gems/trestle-auth/CVE-2021-29435.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ description: |

The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.

cvss_v3: 8.1

patched_versions:
- ">= 0.4.2"

Expand Down