Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 905330 (CVE-2023-22797)

Summary: <dev-ruby/actionpack-7.0.4.1: open redirect vulnerability
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: trivial CC: ruby
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: ~4 [noglsa]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-29 20:58:35 UTC
CVE-2023-22797 (https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127):

An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.

The reference is obviously wrong, NVD even calls it "Not
Applicable". Will contact HackerOne.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-29 21:01:04 UTC
Seems like the real advisory is here and is in ActionPack:
https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vulnerability-in-action-pack/82120
Comment 2 Hans de Graaff gentoo-dev Security 2023-04-30 09:15:30 UTC
This rails slot does not have any stable versions.

Clean is now down.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-01 04:36:29 UTC
Then all done, thanks!