Description
There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
Published: 2025-01-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5389-1 rails security update
Github GHSA Github GHSA GHSA-pj73-v5mw-pm9j Possible XSS Security Vulnerability in SafeBuffer#bytesplice
History

Thu, 09 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Thu, 09 Jan 2025 01:00:00 +0000

Type Values Removed Values Added
Description A Cross-Site-Scripting vulnerability was found in rubygem ActiveSupport. If the new bytesplice method is called on a SafeBuffer with untrusted user input, malicious code could be executed. There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2025-01-09T21:46:38.220Z

Reserved: 2023-03-10T19:36:27.051Z

Link: CVE-2023-28120

cve-icon Vulnrichment

Updated: 2025-01-09T21:46:31.379Z

cve-icon NVD

Status : Deferred

Published: 2025-01-09T01:15:07.637

Modified: 2026-04-15T00:35:42.020

Link: CVE-2023-28120

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-15T00:00:00Z

Links: CVE-2023-28120 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses