CVE-2023-22797

An open redirect vulnerability is fixed in Rails 7.0.4.1 with the new protection against open redirects from calling redirect_to with untrusted user input. In prior versions the developer was fully responsible for only providing trusted input. However the check introduced could allow an attacker to bypass with a carefully crafted URL resulting in an open redirect vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 - Not Applicable () https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127 - Not Applicable

Information

Published : 2023-02-09 20:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22797

Mitre link : CVE-2023-22797

CVE.ORG link : CVE-2023-22797


JSON object : View

Products Affected

rubyonrails

  • rails

actionpack_project

  • actionpack
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')