First published: Tue Jun 04 2024(Updated: )
Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actiontext | =7.2.0.beta1 | 7.2.0.beta2 |
rubygems/actiontext | >=7.1.0<7.1.3.4 | 7.1.3.4 |
Ruby on Rails | >=7.1.0<7.1.3.4 | |
Ruby on Rails | =7.2.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32464 is considered a significant vulnerability due to the potential for unsanitized HTML exposure.
To patch CVE-2024-32464, update Action Text to version 7.1.3.4 or 7.2.0.beta2.
CVE-2024-32464 affects Action Text versions prior to 7.1.3.4 and 7.2.0.beta2.
The risks associated with CVE-2024-32464 include potential XSS attacks due to unsanitized HTML content.
Currently, the best recommendation for CVE-2024-32464 is to update to the fixed versions as there are no known workarounds.