CVE-2024-54133

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-54133
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-54133.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-54133
Aliases
Downstream
Related
Published
2024-12-10T22:52:04Z
Modified
2025-10-10T01:32:17.161855Z
Severity
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N CVSS Calculator
Summary
Possible Content Security Policy bypass in Action Dispatch
Details

Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the content_security_policy helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

References

Affected packages

Git / github.com/rails/rails

Affected ranges

Type
GIT
Repo
https://github.com/rails/rails
Events
Type
GIT
Repo
https://github.com/rails/rails
Events
Type
GIT
Repo
https://github.com/rails/rails
Events
Type
GIT
Repo
https://github.com/rails/rails
Events

Affected versions

v7.*

v7.1.0
v7.1.1
v7.1.2
v7.1.3
v7.1.3.1
v7.1.3.2
v7.1.3.3
v7.1.3.4
v7.1.4
v7.1.4.1
v7.1.4.2
v7.1.5
v7.2.0
v7.2.1
v7.2.1.1
v7.2.1.2
v7.2.2

v8.*

v8.0.0