Skip to content

Commit 4ac2ef3

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 1 new and 8 modified advisories
1 parent 27ed0d3 commit 4ac2ef3

File tree

9 files changed

+39
-1
lines changed

9 files changed

+39
-1
lines changed

gems/actiontext/CVE-2024-34341.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: actiontext
3+
framework: rails
34
cve: 2024-34341
45
ghsa: qjqp-xr96-cj99
56
url: https://github.com/advisories/GHSA-qjqp-xr96-cj99
@@ -54,12 +55,12 @@ description: |
5455
can significantly mitigate the risk of such vulnerabilities.
5556
Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin
5657
are executed, and explicitly prohibit inline scripts using script-src-elem.
58+
cvss_v3: 5.4
5759
unaffected_versions:
5860
- "< 7.0.0"
5961
patched_versions:
6062
- "~> 7.0.8, >= 7.0.8.3"
6163
- ">= 7.1.3.3"
62-
cvss_v3: 5.4
6364
related:
6465
url:
6566
- https://discuss.rubyonrails.org/t/xss-vulnerabilities-in-trix-editor/85803

gems/activestorage/CVE-2025-24293.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: activestorage
3+
framework: rails
34
cve: 2025-24293
45
ghsa: r4mg-4433-c7g3
56
url: https://github.com/rails/rails/security/advisories/GHSA-r4mg-4433-c7g3

gems/jquery-rails/CVE-2011-4969.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: jquery-rails
3+
framework: rails
34
cve: 2011-4969
45
ghsa: 579v-mp3v-rrw5
56
url: http://blog.jquery.com/2011/09/01/jquery-1-6-3-released

gems/jquery-rails/CVE-2015-1840.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: jquery-rails
3+
framework: rails
34
cve: 2015-1840
45
ghsa: 4whc-pp4x-9pf3
56
url: https://groups.google.com/forum/#!topic/ruby-security-ann/XIZPbobuwaY

gems/jquery-rails/CVE-2016-10707.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: jquery-rails
3+
framework: rails
34
cve: 2016-10707
45
ghsa: mhpp-875w-9cpv
56
url: https://nvd.nist.gov/vuln/detail/CVE-2016-10707

gems/jquery-rails/CVE-2020-11022.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: jquery-rails
3+
framework: rails
34
cve: 2020-11022
45
ghsa: gxr4-xjj5-5px2
56
url: https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2

gems/jquery-rails/CVE-2020-7656.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: jquery-rails
3+
framework: rails
34
cve: 2020-7656
45
ghsa: q4m3-2j7h-f7xw
56
url: https://snyk.io/vuln/SNYK-JS-JQUERY-569619

gems/openc3/CVE-2025-68271.yml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
gem: openc3
3+
cve: 2025-68271
4+
ghsa: w757-4qv9-mghp
5+
url: https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
6+
title: openc3-api Vulnerable to Unauthenticated Remote Code Execution
7+
date: 2026-01-13
8+
description: |
9+
### Summary
10+
11+
OpenC3 COSMOS contains a critical remote code execution vulnerability
12+
reachable through the JSON-RPC API. When a JSON-RPC request uses the
13+
string form of certain APIs, attacker-controlled parameter text is
14+
parsed into values using String#convert_to_value. For array-like
15+
inputs, convert_to_value executes eval().
16+
17+
Because the cmd code path parses the command string before calling
18+
authorize(), an unauthenticated attacker can trigger Ruby code
19+
execution even though the request ultimately fails authorization (401).
20+
cvss_v3: 10.0
21+
unaffected_versions:
22+
- "< 5.0.6"
23+
patched_versions:
24+
- ">= 6.10.2"
25+
related:
26+
url:
27+
- https://nvd.nist.gov/vuln/detail/CVE-2025-68271
28+
- https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
29+
- https://github.com/OpenC3/cosmos/commit/01e9fbc5e66e9a2500b71a75a44775dd1fc2d1de
30+
- https://github.com/advisories/GHSA-w757-4qv9-mghp

gems/spree/CVE-2011-10019.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ description: |
1313
attackers to execute arbitrary shell commands on the server without
1414
authentication.
1515
cvss_v2: 9.0
16+
cvss_v3: 9.8
1617
patched_versions:
1718
- ">= 0.60.2"
1819
related:

0 commit comments

Comments
 (0)