HomeRubyonrailsCVE-2022-23633

CVE-2022-23633

HIGH
7.4CVSS
Published: 2022-02-11
Updated: 2024-11-21
AI Analysis

Description

Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-200CWE-212

Metadata

Primary Vendor
RUBYONRAILS
Published
2/11/2022
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

rubyonrails : railsrubyonrails : railsrubyonrails : railsrubyonrails : railsdebian : debian_linuxdebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2022-23633 | HIGH Severity | CVEDatabase.com | CVEDatabase.com