Skip to content

Commit bfc745b

Browse files
jasnowRubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@2780bcd
1 parent 0089cbf commit bfc745b

File tree

3 files changed

+125
-0
lines changed

3 files changed

+125
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2023-46950 (sidekiq-unique-jobs): Cross Site Scripting vulnerability in
4+
Contribsys Sidekiq'
5+
comments: false
6+
categories:
7+
- sidekiq-unique-jobs
8+
advisory:
9+
gem: sidekiq-unique-jobs
10+
cve: 2023-46950
11+
ghsa: fhx8-5c23-x7x5
12+
url: https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
13+
title: Cross Site Scripting vulnerability in Contribsys Sidekiq
14+
date: 2024-03-01
15+
description: |
16+
Cross Site Scripting vulnerability in Contribsys Sidekiq v.6.5.8
17+
allows a remote attacker to obtain sensitive information via a
18+
crafted URL to the filter functions.
19+
cvss_v3: 6.1
20+
patched_versions:
21+
- "~> 7.1.33"
22+
- ">= 8.0.7"
23+
related:
24+
url:
25+
- https://nvd.nist.gov/vuln/detail/CVE-2023-46950
26+
- https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38
27+
- https://github.com/mhenrixon/sidekiq-unique-jobs/releases/tag/v8.0.7
28+
- https://www.mgm-sp.com/cve/sidekiq-unique-jobs-reflected-xss-cve-2023-46950-cve-2023-46951
29+
- https://github.com/mhenrixon/sidekiq-unique-jobs/pull/829
30+
- https://github.com/mhenrixon/sidekiq-unique-jobs/commit/cd09ba6108f98973b6649a6149790c3d4502b4cc
31+
- https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed
32+
- https://github.com/advisories/GHSA-fhx8-5c23-x7x5
33+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-32034 (decidim-admin): Decidim::Admin vulnerable to cross-site scripting
4+
(XSS) in the admin activity log'
5+
comments: false
6+
categories:
7+
- decidim-admin
8+
advisory:
9+
gem: decidim-admin
10+
cve: 2024-32034
11+
ghsa: rx9f-5ggv-5rh6
12+
url: https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6
13+
title: Decidim::Admin vulnerable to cross-site scripting (XSS) in the admin activity
14+
log
15+
date: 2024-09-16
16+
description: |
17+
### Impact
18+
The admin panel is subject to potential XSS attach in case an admin
19+
assigns a valuator to a proposal, or does any other action that
20+
generates an admin activity log where one of the resources has an
21+
XSS crafted.
22+
23+
### Patches
24+
N/A
25+
26+
### Workarounds
27+
Redirect the pages /admin and /admin/logs to other admin pages
28+
to prevent this access (i.e. `/admin/organization/edit`)
29+
30+
### References
31+
OWASP ASVS v4.0.3-5.1.3
32+
cvss_v3: 6.8
33+
patched_versions:
34+
- "~> 0.27.7"
35+
- ">= 0.28.2"
36+
related:
37+
url:
38+
- https://nvd.nist.gov/vuln/detail/CVE-2024-32034
39+
- https://github.com/decidim/decidim/security/advisories/GHSA-rx9f-5ggv-5rh6
40+
- https://github.com/decidim/decidim/commit/23fc8d702a4976727f78617f5e42353d67931645
41+
- https://github.com/decidim/decidim/commit/9d79f09a2d38c87feb28725670d6cc1f55c22072
42+
- https://github.com/decidim/decidim/commit/e494235d559be13dd1f8694345e6f6bba762d1c0
43+
- https://github.com/decidim/decidim/commit/ff755e23814aeb56e9089fc08006a5d3faee47b6
44+
- https://github.com/advisories/GHSA-rx9f-5ggv-5rh6
45+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-39910 (decidim): Decidim::Admin vulnerable to cross-site scripting
4+
(XSS) in the admin panel with QuillJS WYSWYG editor'
5+
comments: false
6+
categories:
7+
- decidim
8+
advisory:
9+
gem: decidim
10+
cve: 2024-39910
11+
ghsa: vvqw-fqwx-mqmm
12+
url: https://github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm
13+
title: Decidim::Admin vulnerable to cross-site scripting (XSS) in the admin panel
14+
with QuillJS WYSWYG editor
15+
date: 2024-09-16
16+
description: |
17+
### Impact
18+
The WYSWYG editor QuillJS is subject to potential XSS attach in
19+
case the attacker manages to modify the HTML before being
20+
uploaded to the server.
21+
22+
The attacker is able to change e.g. to <svg onload=alert('XSS')>
23+
if they know how to craft these requests themselves.
24+
25+
### Patches
26+
N/A
27+
28+
### Workarounds
29+
Review the user accounts that have access to the admin panel (i.e.
30+
general Administrators, and participatory space's Administrators)
31+
and remove access to them if they don't need it.
32+
33+
Disable the "Enable rich text editor for participants" setting in
34+
the admin dashboard.
35+
36+
### References
37+
OWASP ASVS v4.0.3-5.1.3
38+
cvss_v3: 5.4
39+
patched_versions:
40+
- ">= 0.27.7"
41+
related:
42+
url:
43+
- https://nvd.nist.gov/vuln/detail/CVE-2024-39910
44+
- https://github.com/decidim/decidim/security/advisories/GHSA-vvqw-fqwx-mqmm
45+
- https://github.com/decidim/decidim/commit/47adca81cabea898005ec07b130b008f2a2be99f
46+
- https://github.com/advisories/GHSA-vvqw-fqwx-mqmm
47+
---

0 commit comments

Comments
 (0)