First published: Thu Feb 09 2023(Updated: )
An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Actionpack Project Actionpack | >=7.0.0<7.0.4.1 | |
Rubyonrails Rails | >=7.0.0<7.0.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22797 is an open redirect vulnerability fixed in Rails 7.0.4.1.
Versions 7.0.0 to 7.0.4.1 of Rails are affected by CVE-2023-22797.
CVE-2023-22797 has a severity rating of medium.
CVE-2023-22797 can be fixed by updating to Rails version 7.0.4.1 or later.
You can find more information about CVE-2023-22797 at the following link: https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127