Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 905330 (CVE-2023-22797) - <dev-ruby/actionpack-7.0.4.1: open redirect vulnerability
Summary: <dev-ruby/actionpack-7.0.4.1: open redirect vulnerability
Status: RESOLVED FIXED
Alias: CVE-2023-22797
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-04-29 20:58 UTC by John Helmert III
Modified: 2023-05-01 04:36 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-29 20:58:35 UTC
CVE-2023-22797 (https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127):

An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.

The reference is obviously wrong, NVD even calls it "Not
Applicable". Will contact HackerOne.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-04-29 21:01:04 UTC
Seems like the real advisory is here and is in ActionPack:
https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vulnerability-in-action-pack/82120
Comment 2 Hans de Graaff gentoo-dev Security 2023-04-30 09:15:30 UTC
This rails slot does not have any stable versions.

Clean is now down.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-05-01 04:36:29 UTC
Then all done, thanks!