CVE-2022-23633
Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
Published
2022-02-11T21:15:11.990
Last Modified
2024-11-21T06:48:58.787
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 7.4 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
-
Type: Secondary
CWE-200
-
Type: Primary
CWE-212
Affected Vendors & Products
References
-
http://www.openwall.com/lists/oss-security/2022/02/11/5
Mailing List, Mitigation, Patch, Third Party Advisory
([email protected])
-
https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da
Patch, Third Party Advisory
([email protected])
-
https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9
Mitigation, Third Party Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html
Mailing List, Third Party Advisory
([email protected])
-
https://security.netapp.com/advisory/ntap-20240119-0013/
([email protected])
-
https://www.debian.org/security/2023/dsa-5372
Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/02/11/5
Mailing List, Mitigation, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9
Mitigation, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20240119-0013/
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2023/dsa-5372
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)