CVE-2022-23633

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:48

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/02/11/5 - Mailing List, Mitigation, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/02/11/5 - Mailing List, Mitigation, Patch, Third Party Advisory
References () https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da - Patch, Third Party Advisory () https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da - Patch, Third Party Advisory
References () https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 - Mitigation, Third Party Advisory () https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9 - Mitigation, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240119-0013/ - () https://security.netapp.com/advisory/ntap-20240119-0013/ -
References () https://www.debian.org/security/2023/dsa-5372 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5372 - Third Party Advisory
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 7.4

19 Jan 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240119-0013/ -

11 Jul 2023, 20:41

Type Values Removed Values Added
References (DEBIAN) https://www.debian.org/security/2023/dsa-5372 - (DEBIAN) https://www.debian.org/security/2023/dsa-5372 - Third Party Advisory
CWE CWE-200 CWE-212
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

Information

Published : 2022-02-11 21:15

Updated : 2024-11-21 06:48


NVD link : CVE-2022-23633

Mitre link : CVE-2022-23633

CVE.ORG link : CVE-2022-23633


JSON object : View

Products Affected

rubyonrails

  • rails

debian

  • debian_linux
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer