CVE-2023-28362

NameCVE-2023-28362
DescriptionPossible XSS via User Supplied Values to redirect_to
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1051058

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)jessie, jessie (lts)2:4.1.8-1+deb8u9vulnerable
stretch (security), stretch (lts), stretch2:4.2.7.1-1+deb9u5vulnerable
buster2:5.2.2.1+dfsg-1+deb10u3vulnerable
buster (security)2:5.2.2.1+dfsg-1+deb10u5vulnerable
bullseye (security), bullseye2:6.0.3.7+dfsg-2+deb11u2vulnerable
bookworm2:6.1.7.3+dfsg-1vulnerable
trixie, sid2:6.1.7.3+dfsg-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssourcejessie(unfixed)end-of-life
railssource(unstable)(unfixed)1051058

Notes

[bookworm] - rails <no-dsa> (Minor issue)
[bullseye] - rails <no-dsa> (Minor issue)
https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-values-to-redirect-to/83132
https://github.com/rails/rails/commit/69e37c84e3f77d75566424c7d0015172d6a6fac5 (main)
https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441 (v6.1.7.4)

Search for package or bug name: Reporting problems