Bugzilla – Bug 1209506
VUL-0: CVE-2023-28120: rubygem-activesupport-4_2,rubygem-activesupport-5_1: rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice
Last modified: 2023-09-25 12:02:02 UTC
+++ This bug was initially created as a clone of Bug #1209505 +++ CVE-2023-28120 There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input. ActiveSupport uses the SafeBuffer string subclass to tag strings as html_safe after they have been sanitized. When these strings are mutated, the tag should be removed to mark them as no longer being html_safe. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28120 https://bugzilla.redhat.com/show_bug.cgi?id=2179637
Affected: - SUSE:SLE-12:Update/rubygem-activesupport-4_2 4.2.9 - SUSE:SLE-15:Update/rubygem-activesupport-5_1 5.1.4 - openSUSE:Factory/rubygem-activesupport-7.0 7.0.4.1
Fix: https://github.com/rails/rails/commit/217411564e3930e2206a3af598a4762a94e716c6 Github advisory: https://github.com/advisories/GHSA-pj73-v5mw-pm9j
Okay, thanks, i will track those not affected because we only build them for ruby<3.2: - SUSE:SLE-12:Update/rubygem-activesupport-4_2 4.2.9 - SUSE:SLE-15:Update/rubygem-activesupport-5_1 5.1.4
All fixed by Factory submission then by https://build.opensuse.org/request/show/1073255
done, closing