First published: Wed Apr 27 2022(Updated: )
An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rubygem-actionpack | <0:6.1.7-1.el8 | 0:6.1.7-1.el8 |
Rubyonrails Actionpack | >=5.2.0<5.2.7.1 | |
Rubyonrails Actionpack | >=6.0.0<6.0.4.8 | |
Rubyonrails Actionpack | >=6.1.0<6.1.5.1 | |
Rubyonrails Actionpack | >=7.0.0<7.0.2.4 | |
Debian Debian Linux | =10.0 | |
debian/rails | <=2:5.2.2.1+dfsg-1+deb10u3<=2:5.2.2.1+dfsg-1<=2:6.0.3.7+dfsg-2<=2:6.1.4.6+dfsg-2 | |
debian/rails | <=2:5.2.2.1+dfsg-1+deb10u3 | 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22577 is an XSS vulnerability in Action Pack versions greater than or equal to 5.2.0 and less than 5.2.0, which could allow an attacker to bypass CSP headers and perform a cross-site scripting attack.
CVE-2022-22577 has a severity level of 7.5 (high).
Action Pack versions 5.2.0 to 5.2.7.1, 6.0.0 to 6.0.4.8, 6.1.0 to 6.1.5.1, and 7.0.0 to 7.0.2.4 are affected by CVE-2022-22577.
To fix CVE-2022-22577, upgrade to Action Pack version 5.2.7.1, 6.0.4.8, 6.1.5.1, or 7.0.2.4, depending on your current version.
You can find more information about CVE-2022-22577 in the Ruby Advisory Database, Red Hat Bugzilla, and Red Hat Errata.