Skip to content

Commit f6d8a21

Browse files
committed
Sync with GitHub Security Advisories
* Add CVE-2022-27311 for gibbon * Add CVE-2022-25648 for git * Add CVSSv3 score for several advisories
1 parent 02d871a commit f6d8a21

4 files changed

Lines changed: 32 additions & 0 deletions

File tree

gems/actionpack/CVE-2022-22577.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: actionpack
33
framework: rails
44
cve: 2022-22577
5+
ghsa: mm33-5vfq-3mm3
56
url: https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI
67
title: Possible XSS Vulnerability in Action Pack
78
date: 2022-04-27

gems/actionview/CVE-2022-27777.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
gem: actionview
33
framework: rails
44
cve: 2022-27777
5+
ghsa: ch3h-j2vf-95pv
56
url: https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw
67
title: Possible XSS Vulnerability in Action View tag helpers
78
date: 2022-04-26

gems/gibbon/CVE-2022-27311.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
gem: gibbon
3+
cve: 2022-27311
4+
ghsa: vx9g-377x-xwxq
5+
url: https://github.com/amro/gibbon/pull/321
6+
title: Server side request forgery in gibbon
7+
date: 2022-04-26
8+
description: |
9+
Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request
10+
Forgery (SSRF) via a crafted URL. A partial fix has been introduced in version 3.4.4,
11+
however a complete fix has not yet been created. See Pull request 321 in github.com/amro/gibbon
12+
for details.

gems/git/CVE-2022-25648.yml

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
gem: git
3+
cve: 2022-25648
4+
ghsa: 69p6-wvmq-27gg
5+
url: https://github.com/ruby-git/ruby-git/pull/569
6+
title: Command injection in ruby-git
7+
date: 2022-04-20
8+
description: |
9+
The package git before 1.11.0 are vulnerable to Command Injection via
10+
git argument injection. When calling the fetch(remote = 'origin', opts = {}) function,
11+
the remote parameter is passed to the git fetch subcommand in a way that additional
12+
flags can be set. The additional flags can be used to perform a command injection.
13+
cvss_v3: 9.8
14+
patched_versions:
15+
- ">= 1.11.0"
16+
related:
17+
url:
18+
- https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0

0 commit comments

Comments
 (0)