Exposure of sensitive information in Action Pack
CVE-2022-23633

7.4HIGH

Key Information:

Vendor

Rails

Status
Vendor
CVE Published:
11 February 2022

What is CVE-2022-23633?

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is not notified of a close, ActionDispatch::Executor will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.

Affected Version(s)

rails >= 7.0.0.0, < 7.0.2.1 < 7.0.0.0, 7.0.2.1

rails >= 6.1.0.0, < 6.1.4.5 < 6.1.0.0, 6.1.4.5

rails >= 6.0.0.0, < 6.0.4.5 < 6.0.0.0, 6.0.4.5

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.