You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Path to vulnerable library: /.7.0/cache/sinatra-3.0.2.gem
Dependency Hierarchy:
❌ sinatra-3.0.2.gem (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
Path to vulnerable library: /.7.0/cache/sinatra-3.0.2.gem
Dependency Hierarchy:
❌ sinatra-3.0.2.gem (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.
mend-for-github-combot
changed the title
sinatra-3.0.2.gem: 1 vulnerabilities (highest severity is: 8.8)
sinatra-3.0.2.gem: 2 vulnerabilities (highest severity is: 8.8)
Nov 4, 2024
Vulnerable Library - sinatra-3.0.2.gem
Sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.
Library home page: https://rubygems.org/gems/sinatra-3.0.2.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /.7.0/cache/sinatra-3.0.2.gem
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2022-45442
Vulnerable Library - sinatra-3.0.2.gem
Sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.
Library home page: https://rubygems.org/gems/sinatra-3.0.2.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /.7.0/cache/sinatra-3.0.2.gem
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
Publish Date: 2022-11-28
URL: CVE-2022-45442
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.6%
CVSS 3 Score Details (8.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-2x8x-jmrp-phxw
Release Date: 2022-11-28
Fix Resolution: sinatra - 2.2.3,3.0.4
⛑️ Automatic Remediation will be attempted for this issue.
CVE-2024-21510
Vulnerable Library - sinatra-3.0.2.gem
Sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.
Library home page: https://rubygems.org/gems/sinatra-3.0.2.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /.7.0/cache/sinatra-3.0.2.gem
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.
Publish Date: 2024-11-01
URL: CVE-2024-21510
Threat Assessment
Exploit Maturity: Proof of concept
EPSS: 0.0%
CVSS 3 Score Details (5.4)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-hxx2-7vcw-mqr3
Release Date: 2024-11-01
Fix Resolution: sinatra - 4.1.0
⛑️ Automatic Remediation will be attempted for this issue.
⛑️Automatic Remediation will be attempted for this issue.
The text was updated successfully, but these errors were encountered: