Skip to content

Commit d0fdb06

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@4ac2ef3
1 parent 4ee854b commit d0fdb06

8 files changed

+52
-1
lines changed

advisories/_posts/2011-02-10-CVE-2011-10019.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ advisory:
1919
attackers to execute arbitrary shell commands on the server without
2020
authentication.
2121
cvss_v2: 9.0
22+
cvss_v3: 9.8
2223
patched_versions:
2324
- ">= 0.60.2"
2425
related:

advisories/_posts/2011-09-01-CVE-2011-4969.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,10 @@ title: 'CVE-2011-4969 (jquery-rails): jQuery vulnerable to Cross-Site Scripting
44
comments: false
55
categories:
66
- jquery-rails
7+
- rails
78
advisory:
89
gem: jquery-rails
10+
framework: rails
911
cve: 2011-4969
1012
ghsa: 579v-mp3v-rrw5
1113
url: http://blog.jquery.com/2011/09/01/jquery-1-6-3-released

advisories/_posts/2018-01-18-CVE-2016-10707.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,10 @@ title: 'CVE-2016-10707 (jquery-rails): Denial of Service in jquery'
44
comments: false
55
categories:
66
- jquery-rails
7+
- rails
78
advisory:
89
gem: jquery-rails
10+
framework: rails
911
cve: 2016-10707
1012
ghsa: mhpp-875w-9cpv
1113
url: https://nvd.nist.gov/vuln/detail/CVE-2016-10707

advisories/_posts/2020-04-29-CVE-2020-11022.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,10 @@ title: 'CVE-2020-11022 (jquery-rails): Potential XSS vulnerability in jQuery'
44
comments: false
55
categories:
66
- jquery-rails
7+
- rails
78
advisory:
89
gem: jquery-rails
10+
framework: rails
911
cve: 2020-11022
1012
ghsa: gxr4-xjj5-5px2
1113
url: https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2

advisories/_posts/2020-05-20-CVE-2020-7656.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,10 @@ title: 'CVE-2020-7656 (jquery-rails): Cross-Site Scripting in jquery'
44
comments: false
55
categories:
66
- jquery-rails
7+
- rails
78
advisory:
89
gem: jquery-rails
10+
framework: rails
911
cve: 2020-7656
1012
ghsa: q4m3-2j7h-f7xw
1113
url: https://snyk.io/vuln/SNYK-JS-JQUERY-569619

advisories/_posts/2024-05-07-CVE-2024-34341.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,10 @@ title: 'CVE-2024-34341 (actiontext): Arbitrary Code Execution Vulnerability in T
55
comments: false
66
categories:
77
- actiontext
8+
- rails
89
advisory:
910
gem: actiontext
11+
framework: rails
1012
cve: 2024-34341
1113
ghsa: qjqp-xr96-cj99
1214
url: https://github.com/advisories/GHSA-qjqp-xr96-cj99
@@ -61,12 +63,12 @@ advisory:
6163
can significantly mitigate the risk of such vulnerabilities.
6264
Set CSP policies such as script-src 'self' to ensure that only scripts hosted on the same origin
6365
are executed, and explicitly prohibit inline scripts using script-src-elem.
66+
cvss_v3: 5.4
6467
unaffected_versions:
6568
- "< 7.0.0"
6669
patched_versions:
6770
- "~> 7.0.8, >= 7.0.8.3"
6871
- ">= 7.1.3.3"
69-
cvss_v3: 5.4
7072
related:
7173
url:
7274
- https://discuss.rubyonrails.org/t/xss-vulnerabilities-in-trix-editor/85803

advisories/_posts/2025-08-14-CVE-2025-24293.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,10 @@ title: 'CVE-2025-24293 (activestorage): Active Storage allowed transformation me
55
comments: false
66
categories:
77
- activestorage
8+
- rails
89
advisory:
910
gem: activestorage
11+
framework: rails
1012
cve: 2025-24293
1113
ghsa: r4mg-4433-c7g3
1214
url: https://github.com/rails/rails/security/advisories/GHSA-r4mg-4433-c7g3
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2025-68271 (openc3): openc3-api Vulnerable to Unauthenticated Remote Code
4+
Execution'
5+
comments: false
6+
categories:
7+
- openc3
8+
advisory:
9+
gem: openc3
10+
cve: 2025-68271
11+
ghsa: w757-4qv9-mghp
12+
url: https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
13+
title: openc3-api Vulnerable to Unauthenticated Remote Code Execution
14+
date: 2026-01-13
15+
description: |
16+
### Summary
17+
18+
OpenC3 COSMOS contains a critical remote code execution vulnerability
19+
reachable through the JSON-RPC API. When a JSON-RPC request uses the
20+
string form of certain APIs, attacker-controlled parameter text is
21+
parsed into values using String#convert_to_value. For array-like
22+
inputs, convert_to_value executes eval().
23+
24+
Because the cmd code path parses the command string before calling
25+
authorize(), an unauthenticated attacker can trigger Ruby code
26+
execution even though the request ultimately fails authorization (401).
27+
cvss_v3: 10.0
28+
unaffected_versions:
29+
- "< 5.0.6"
30+
patched_versions:
31+
- ">= 6.10.2"
32+
related:
33+
url:
34+
- https://nvd.nist.gov/vuln/detail/CVE-2025-68271
35+
- https://github.com/OpenC3/cosmos/security/advisories/GHSA-w757-4qv9-mghp
36+
- https://github.com/OpenC3/cosmos/commit/01e9fbc5e66e9a2500b71a75a44775dd1fc2d1de
37+
- https://github.com/advisories/GHSA-w757-4qv9-mghp
38+
---

0 commit comments

Comments
 (0)