Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
References
Link | Resource |
---|---|
https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da | Patch Third Party Advisory |
https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 | Mitigation Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/02/11/5 | Mailing List Mitigation Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2023/dsa-5372 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
11 Jul 2023, 20:41
Type | Values Removed | Values Added |
---|---|---|
References | (DEBIAN) https://www.debian.org/security/2023/dsa-5372 - Third Party Advisory | |
CWE | CWE-212 | |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
14 Mar 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Sep 2022, 19:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
First Time |
Debian debian Linux
Debian |
|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory |
03 Sep 2022, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CWE | CWE-200 |
22 Feb 2022, 21:47
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rubyonrails rails
Rubyonrails |
|
CWE | NVD-CWE-noinfo | |
References | (MISC) https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da - Patch, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/02/11/5 - Mailing List, Mitigation, Patch, Third Party Advisory | |
References | (CONFIRM) https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 - Mitigation, Third Party Advisory | |
CPE | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.9 |
12 Feb 2022, 01:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Feb 2022, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-11 21:15
Updated : 2023-07-11 20:41
NVD link : CVE-2022-23633
Mitre link : CVE-2022-23633
CVE.ORG link : CVE-2022-23633
JSON object : View
Products Affected
debian
- debian_linux
rubyonrails
- rails
CWE
CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer