Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 878495 (CVE-2022-3704) - <dev-ruby/rails-7.1.1: XSS within Route Error Page
Summary: <dev-ruby/rails-7.1.1: XSS within Route Error Page
Status: RESOLVED INVALID
Alias: CVE-2022-3704
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor
Assignee: Gentoo Security
URL: https://github.com/rails/rails/issues...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-10-28 02:28 UTC by John Helmert III
Modified: 2024-05-05 08:07 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-28 02:28:59 UTC
CVE-2022-3704:

A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319.

Patch: https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4

Bit silly to say that XSS is possible to initiate remotely, I
think. Looks like we're waiting for a release or downstream patch.
Comment 1 Hans de Graaff gentoo-dev Security 2022-10-30 09:54:49 UTC
(In reply to John Helmert III from comment #0)

> A vulnerability classified as problematic has been found in Ruby on Rails.
> This affects an unknown part of the file
> actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb.
> The manipulation leads to cross site scripting. It is possible to initiate
> the attack remotely. The name of the patch is
> be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch
> to fix this issue. The associated identifier of this vulnerability is
> VDB-212319.

I'd be very interested to learn how this is triggered remotely. My understanding is that the page that includes this code is only available in development mode. I guess you could run a rails app in development on a public IP address and then link to this page. Seems far fetched in practice. Or not, reading the pentest comment :-(

> Bit silly to say that XSS is possible to initiate remotely, I
> think. Looks like we're waiting for a release or downstream patch.

I'd wait for a release here.
Comment 2 Christopher Fore 2024-04-21 22:04:24 UTC
I don't think there was ever a stable version in tree so dropping to ~ and pushing to cleanup. The developers also said isn't an actual security issue because of how the bug is ran, is this good to close?

https://github.com/rails/rails/issues/46244#issuecomment-1380875153
Comment 3 Hans de Graaff gentoo-dev Security 2024-05-05 08:07:09 UTC
(In reply to Hans de Graaff from comment #1)

> I'd be very interested to learn how this is triggered remotely. My
> understanding is that the page that includes this code is only available in
> development mode. I guess you could run a rails app in development on a
> public IP address and then link to this page. Seems far fetched in practice.
> Or not, reading the pentest comment :-(

Reading the upstream response seems to validate this, and we should not consider this a security bug either. I'm closing it with noglsa (I don't think we have a whiteboard status for "oh, not a security issue").