
We found results for “”
CVE-2022-23633
Good to know:

Date: February 10, 2022
Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is not notified of a "close", "ActionDispatch::Executor" will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.
Language: Ruby
Severity Score
Related Resources (30)
Severity Score
Weakness Type (CWE)
Improper Resource Shutdown or Release
CWE-404Exposure of Sensitive Information to an Unauthorized Actor
CWE-200Insufficient Information
NVD-CWE-noinfoImproper Removal of Sensitive Information Before Storage or Transfer
CWE-212Top Fix

Upgrade Version
Upgrade to version actionpack - 5.2.6.2;actionpack - 6.0.4.6;actionpack - 6.1.4.6;actionpack - 7.0.2.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |