File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ---
2+ gem : httparty
3+ ghsa : 5pq7-52mg-hr42
4+ url : https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
5+ title : httparty has multipart/form-data request tampering vulnerability
6+ date : 2023-01-03
7+ description : |
8+ "multipart/form-data request tampering vulnerability"
9+ caused by Content-Disposition "filename" lack of escaping in httparty.
10+
11+ `httparty/lib/httparty/request` > `body.rb` > `def generate_multipart`
12+
13+ https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
14+
15+ By exploiting this problem, the following attacks are possible
16+
17+ * An attack that rewrites the \"name\" field according to the crafted file
18+ name, impersonating (overwriting) another field.
19+ * Attacks that rewrite the filename extension at the time multipart/form-data
20+ is generated by tampering with the filename.
21+ cvss_v3 : 6.5
22+ patched_versions :
23+ - " >= 0.21.0"
24+ related :
25+ url :
26+ - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
27+ - https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e
28+ - https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
29+ - https://bugzilla.mozilla.org/show_bug.cgi?id=1556711
Original file line number Diff line number Diff line change 1+ ---
2+ gem : keynote
3+ cve : 2017-20159
4+ ghsa : 399p-vq28-5hg8
5+ url : https://github.com/rf-/keynote/commit/05be4356b0a6ca7de48da926a9b997beb5ffeb4a
6+ title : keynote Cross-site Scripting vulnerability
7+ date : 2022-12-31
8+ description : |
9+ A vulnerability was found in rf Keynote up to 0.x. It has been rated
10+ as problematic. Affected by this issue is some unknown functionality of the file
11+ lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site
12+ scripting. The attack may be launched remotely. Upgrading to version 1.0.0 can address
13+ this issue. The name of the patch is 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It
14+ is recommended to upgrade the affected component. VDB-217142 is the identifier assigned
15+ to this vulnerability.
16+ patched_versions :
17+ - " >= 1.0.0"
18+ related :
19+ url :
20+ - https://github.com/rf-/keynote/releases/tag/v1.0.0
21+ - https://vuldb.com/?id.217142
You can’t perform that action at this time.
0 commit comments