Bug 1209506

Summary: VUL-0: CVE-2023-28120: rubygem-activesupport-4_2,rubygem-activesupport-5_1: rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice
Product: [Novell Products] SUSE Security Incidents Reporter: Cathy Hu <cathy.hu>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: pgajdos, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/360598/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1209505    

Description Cathy Hu 2023-03-20 11:37:52 UTC
+++ This bug was initially created as a clone of Bug #1209505 +++

CVE-2023-28120

There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input. ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized. When these strings are mutated, the tag should be removed to mark them as no longer being html_safe.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28120
https://bugzilla.redhat.com/show_bug.cgi?id=2179637
Comment 1 Cathy Hu 2023-03-20 11:39:05 UTC
Affected:
- SUSE:SLE-12:Update/rubygem-activesupport-4_2          4.2.9
- SUSE:SLE-15:Update/rubygem-activesupport-5_1          5.1.4
- openSUSE:Factory/rubygem-activesupport-7.0            7.0.4.1
Comment 6 Cathy Hu 2023-03-21 12:24:47 UTC
Okay, thanks, i will track those not affected because we only build them for ruby<3.2:

- SUSE:SLE-12:Update/rubygem-activesupport-4_2          4.2.9
- SUSE:SLE-15:Update/rubygem-activesupport-5_1          5.1.4
Comment 7 Petr Gajdos 2023-03-21 12:39:30 UTC
All fixed by Factory submission then by
https://build.opensuse.org/request/show/1073255
Comment 8 Cathy Hu 2023-09-25 12:02:02 UTC
done, closing