Possible XSS Security Vulnerability in SafeBuffer#bytesplice(CVE-2023-28120)
CVE编号
CVE-2023-28120利用情况
暂无补丁情况
N/A披露时间
2023-03-16漏洞描述
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input. This vulnerability has been assigned the CVE identifier CVE-2023-28120.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | alpine_3.17 | ruby-activesupport | * | Up to (excluding) 7.0.4.3-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | ruby-activesupport | * | Up to (excluding) 7.0.4.3-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | ruby-activesupport | * | Up to (excluding) 7.0.4.3-r0 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | rails | * | Up to (including) 5.2.2.1+dfsg-1+deb10u3 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | rails | * | Up to (excluding) 2:6.0.3.7+dfsg-2+deb11u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | rails | * | Up to (excluding) 2:6.1.7.3+dfsg-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | rails | * | Up to (excluding) 2:6.1.7.3+dfsg-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_37 | rubygem-actioncable | * | Up to (excluding) 7.0.4.3-1.fc37 | |||||
运行在以下环境 | |||||||||
系统 | fedora_38 | rubygem-actioncable-doc | * | Up to (excluding) 7.0.4.3-1.fc38 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | rmt-server-config | * | Up to (excluding) 2.13-150400.3.12.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.5 | rmt-server-config | * | Up to (excluding) 2.13-150500.3.3.1 | |||||
- 攻击路径 N/A
- 攻击复杂度 N/A
- 权限要求 N/A
- 影响范围 N/A
- 用户交互 N/A
- 可用性 N/A
- 保密性 N/A
- 完整性 N/A
CWE-ID | 漏洞类型 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论