There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
History

Thu, 09 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 09 Jan 2025 01:00:00 +0000

Type Values Removed Values Added
Description A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrusted user input, malicious code could be executed. There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-01-09T21:46:38.220Z

Reserved: 2023-03-10T19:36:27.051Z

Link: CVE-2023-28120

cve-icon Vulnrichment

Updated: 2025-01-09T21:46:31.379Z

cve-icon NVD

Status : Received

Published: 2025-01-09T01:15:07.637

Modified: 2025-01-09T22:15:26.470

Link: CVE-2023-28120

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-15T00:00:00Z

Links: CVE-2023-28120 - Bugzilla