Skip to content

Commit 722d9d9

Browse files
authored
GHSA/SYNC: 4 new and 1 renamed advisories (#1015)
1 parent b24e1ff commit 722d9d9

File tree

5 files changed

+147
-0
lines changed

5 files changed

+147
-0
lines changed

gems/avo/CVE-2026-33209.yml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
gem: avo
3+
cve: 2026-33209
4+
ghsa: 762r-27w2-q22j
5+
url: https://github.com/avo-hq/avo/security/advisories/GHSA-762r-27w2-q22j
6+
title: Avo has a XSS vulnerability on `return_to` param
7+
date: 2026-03-18
8+
description: |
9+
## Description
10+
11+
A reflected cross-site scripting (XSS) vulnerability exists in
12+
the `return_to` query parameter used in the avo interface.
13+
14+
An attacker can craft a malicious URL that injects arbitrary
15+
JavaScript, which is executed when he clicks a dynamically
16+
generated navigation button.
17+
18+
## Impact
19+
20+
This vulnerability may allow execution of arbitrary JavaScript
21+
in the context of the application.
22+
23+
Impact varies depending on deployment:
24+
- In unauthenticated setups: exploitable via crafted links sent to users.
25+
- In authenticated setups: limited to authenticated users and
26+
requires interaction.
27+
cvss_v4: 5.3
28+
patched_versions:
29+
- ">= 3.30.3"
30+
related:
31+
url:
32+
- https://github.com/avo-hq/avo/security/advisories/GHSA-762r-27w2-q22j
33+
- https://github.com/advisories/GHSA-762r-27w2-q22j
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
gem: devise
3+
cve: 2026-32700
34
ghsa: 57hq-95w6-v4fc
45
url: https://github.com/heartcombo/devise/security/advisories/GHSA-57hq-95w6-v4fc
56
title: Confirmable "change email" race condition permits

gems/json/CVE-2026-33210.yml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
gem: json
3+
cve: 2026-33210
4+
ghsa: 3m6g-2423-7cp3
5+
url: https://github.com/ruby/json/security/advisories/GHSA-3m6g-2423-7cp3
6+
title: Ruby JSON has a format string injection vulnerability
7+
date: 2026-03-19
8+
description: |
9+
### Impact
10+
11+
A format string injection vulnerability than that lead to denial of
12+
service attacks or information disclosure, when the `allow_duplicate_key:
13+
false` parsing option is used to parse user supplied documents.
14+
15+
This option isn't the default, if you didn't opt-in to use it,
16+
you are not impacted.
17+
18+
### Patches
19+
20+
Patched in `2.19.2`.
21+
22+
### Workarounds
23+
24+
The issue can be avoided by not using the `allow_duplicate_key: false`
25+
parsing option.
26+
unaffected_versions:
27+
- "< 2.14.0"
28+
patched_versions:
29+
- "~> 2.15.2.1"
30+
- "~> 2.17.1.2"
31+
- ">= 2.19.2"
32+
related:
33+
url:
34+
- https://github.com/ruby/json/security/advisories/GHSA-3m6g-2423-7cp3
35+
- https://github.com/advisories/GHSA-3m6g-2423-7cp3

gems/katello/CVE-2026-4324.yml

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
gem: katello
3+
cve: 2026-4324
4+
ghsa: fwj4-6wgp-mpxm
5+
url: https://access.redhat.com/security/cve/CVE-2026-4324
6+
title: Katello - Denial of Service and potential information
7+
disclosure via SQL injection'
8+
date: 2026-03-17
9+
description: |
10+
A flaw was found in the Katello plugin for Red Hat Satellite. This
11+
vulnerability, caused by improper sanitization of user-provided
12+
input, allows a remote attacker to inject arbitrary SQL commands
13+
into the sort_by parameter of the /api/hosts/bootc_images API
14+
endpoint. This can lead to a Denial of Service (DoS) by triggering
15+
database errors, and potentially enable Boolean-based Blind SQL
16+
injection, which could allow an attacker to extract sensitive
17+
information from the database.
18+
cvss_v3: 5.4
19+
patched_versions:
20+
- ">= 4.19.1"
21+
related:
22+
url:
23+
- https://nvd.nist.gov/vuln/detail/CVE-2026-4324
24+
- https://access.redhat.com/security/cve/CVE-2026-4324
25+
- https://bugzilla.redhat.com/show_bug.cgi?id=2448349
26+
- https://github.com/Katello/katello/commit/a0a793b08d4f0a897ee985d79a687ad043f99e57
27+
- https://github.com/advisories/GHSA-fwj4-6wgp-mpxm
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
gem: loofah
3+
ghsa: 46fp-8f5p-pf2m
4+
url: https://github.com/flavorjones/loofah/security/advisories/GHSA-46fp-8f5p-pf2m
5+
title: Improper detection of disallowed URIs by Loofah `allowed_uri?`
6+
date: 2026-03-18
7+
description: |
8+
## Summary
9+
10+
`Loofah::HTML5::Scrub.allowed_uri?` does not correctly reject
11+
`javascript:` URIs when the scheme is split by HTML entity-encoded
12+
control characters such as `&#13;` (carriage return), `&#10;`
13+
(line feed), or `&#9;` (tab).
14+
15+
## Details
16+
17+
The `allowed_uri?` method strips literal control characters before
18+
decoding HTML entities. Payloads like `java&#13;script:alert(1)`
19+
survive the control character strip, then `&#13;` is decoded to
20+
a carriage return, producing `java\rscript:alert(1)`.
21+
22+
Note that the Loofah sanitizer's default `sanitize()` path is
23+
**not affected** because Nokogiri decodes HTML entities during
24+
parsing before Loofah evaluates the URI protocol. This issue only
25+
affects direct callers of the `allowed_uri?` string-level helper
26+
when passing HTML-encoded strings.
27+
28+
## Impact
29+
30+
Applications that call `Loofah::HTML5::Scrub.allowed_uri?` to
31+
validate user-controlled URLs and then render approved URLs into
32+
`href` or other browser-interpreted URI attributes may be
33+
vulnerable to cross-site scripting (XSS).
34+
35+
This only affects Loofah `2.25.0`.
36+
37+
## Mitigation
38+
39+
Upgrade to Loofah >= `2.25.1`.
40+
41+
## Credit
42+
43+
Responsibly reported by HackOne user `@smlee`.
44+
unaffected_versions:
45+
- "< 2.25.0"
46+
patched_versions:
47+
- ">= 2.25.1"
48+
related:
49+
url:
50+
- https://github.com/flavorjones/loofah/security/advisories/GHSA-46fp-8f5p-pf2m
51+
- https://github.com/advisories/GHSA-46fp-8f5p-pf2m

0 commit comments

Comments
 (0)