Skip to content

Commit d155fec

Browse files
jasnowpostmodern
authored andcommitted
GHSA SYNC: 2 brand new advisories
1 parent dfcf81a commit d155fec

File tree

2 files changed

+107
-0
lines changed

2 files changed

+107
-0
lines changed

gems/activerecord/CVE-2025-55193.yml

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
gem: activerecord
3+
framework: rails
4+
cve: 2025-55193
5+
ghsa: 76r7-hhxj-r776
6+
url: https://github.com/rails/rails/security/advisories/GHSA-76r7-hhxj-r776
7+
title: Active Record logging vulnerable to ANSI escape injection
8+
date: 2025-08-13
9+
description: |
10+
This vulnerability has been assigned the CVE identifier CVE-2025-55193
11+
12+
### Impact
13+
14+
The ID passed to `find` or similar methods may be logged without
15+
escaping. If this is directly to the terminal, it may include
16+
unescaped ANSI sequences.
17+
18+
### Releases
19+
20+
The fixed releases are available at the normal locations.
21+
22+
### Credits
23+
24+
Thanks to [lio346](https://hackerone.com/lio346) for reporting
25+
this vulnerability.
26+
patched_versions:
27+
- "~> 7.1.5.2"
28+
- "~> 7.2.2.2"
29+
- ">= 8.0.2.1"
30+
related:
31+
url:
32+
- https://github.com/rails/rails/security/advisories/GHSA-76r7-hhxj-r776
33+
- https://github.com/rails/rails/commit/3beef20013736fd52c5dcfdf061f7999ba318290
34+
- https://github.com/rails/rails/commit/568c0bc2f1e74c65d150a84b89a080949bf9eb9b
35+
- https://github.com/rails/rails/commit/6a944ca4805e72050a0fbb1a461534eb760d3202
36+
- https://cert.kenet.or.ke/cve-2025-55193-ruby-rails-ansi-sequence-injection-vulnerability
37+
- https://github.com/advisories/GHSA-76r7-hhxj-r776

gems/activestorage/CVE-2025-24293.yml

Lines changed: 70 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,70 @@
1+
---
2+
gem: activestorage
3+
cve: 2025-24293
4+
ghsa: r4mg-4433-c7g3
5+
url: https://github.com/rails/rails/security/advisories/GHSA-r4mg-4433-c7g3
6+
title: Active Storage allowed transformation methods that were
7+
potentially unsafe
8+
date: 2025-08-14
9+
description: |
10+
Active Storage attempts to prevent the use of potentially unsafe
11+
image transformation methods and parameters by default.
12+
The default allowed list contains three methods allowing for the
13+
circumvention of the safe defaults which enables potential command
14+
injection vulnerabilities in cases where arbitrary user supplied
15+
input is accepted as valid transformation methods or parameters.
16+
17+
This has been assigned the CVE identifier CVE-2025-24293.
18+
19+
Versions Affected: >= 5.2.0
20+
Not affected: < 5.2.0
21+
Fixed Versions: 7.1.5.2, 7.2.2.2, 8.0.2.1
22+
23+
## Impact
24+
25+
This vulnerability impacts applications that use Active Storage
26+
with the image_processing processing gem in addition to
27+
mini_magick as the image processor.
28+
29+
Vulnerable code will look something similar to this:
30+
31+
```
32+
<= image_tag blob.variant(params[:t] => params[:v]) >
33+
```
34+
35+
Where the transformation method or its arguments are untrusted
36+
arbitrary input.
37+
38+
All users running an affected release should either upgrade or
39+
use one of the workarounds immediately.
40+
41+
## Releases
42+
43+
The fixed releases are available at the normal locations.
44+
45+
## Workarounds
46+
47+
Consuming user supplied input for image transformation methods
48+
or their parameters is unsupported behavior and should be
49+
considered dangerous.
50+
51+
Strict validation of user supplied methods and parameters should
52+
be performed as well as having a strong
53+
[ImageMagick security policy](https://imagemagick.org/script/security-policy.php) deployed.
54+
55+
## Credits
56+
57+
Thank you [lio346](https://hackerone.com/lio346) for reporting this!
58+
unaffected_versions:
59+
- "< 5.20"
60+
patched_versions:
61+
- "~> 7.1.5.2"
62+
- "~> 7.2.2.2"
63+
- ">= 8.0.2.1"
64+
related:
65+
url:
66+
- https://github.com/rails/rails/security/advisories/GHSA-r4mg-4433-c7g3
67+
- https://github.com/rails/rails/commit/1b1adf6ee6ca0f3104fcfce79360b2ec1e06a354
68+
- https://github.com/rails/rails/commit/2d612735ac0d9712fdfffaf80afa627e7295f6ce
69+
- https://github.com/rails/rails/commit/fb8f3a18c3d97524c0efc29150d1e5f3162fbb13
70+
- https://github.com/advisories/GHSA-r4mg-4433-c7g3

0 commit comments

Comments
 (0)