Created by: dependabot-preview[bot]
Bumps actionpack from 6.1.2 to 6.1.2.1. This update includes a security fix.
Vulnerabilities fixed
Sourced from The Ruby Advisory Database.
Possible Open Redirect in Host Authorization Middleware There is a possible open redirect vulnerability in the Host Authorization middleware in Action Pack. This vulnerability has been assigned the CVE identifier CVE-2021-22881.
Versions Affected: >= 6.0.0 Not affected: < 6.0.0 Fixed Versions: 6.1.2.1, 6.0.3.5
Impact
Specially crafted "Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
Impacted applications will have allowed hosts with a leading dot. For example, configuration files that look like this:
config.hosts << '.tkte.ch'
... (truncated)
Patched versions: ~> 6.0.3.5; >= 6.1.2.1 Unaffected versions: < 6.0.0
Release notes
Sourced from actionpack's releases.
6.1.2.1
Active Support
- No changes.
Active Model
- No changes.
Active Record
Fix possible DoS vector in PostgreSQL money type
Carefully crafted input can cause a DoS via the regular expressions used for validating the money format in the PostgreSQL adapter. This patch fixes the regexp.
Thanks to
@dee-seefrom Hackerone for this patch![CVE-2021-22880]
Aaron Patterson
Action View
- No changes.
Action Pack
Prevent open redirect when allowed host starts with a dot
[CVE-2021-22881]
Thanks to
@tktech(https://hackerone.com/tktech) for reporting this issue and the patch!Aaron Patterson
Active Job
... (truncated)
Changelog
Sourced from actionpack's changelog.
Rails 6.1.2.1 (February 10, 2021)
Prevent open redirect when allowed host starts with a dot
[CVE-2021-22881]
Thanks to
@tktech(https://hackerone.com/tktech) for reporting this issue and the patch!Aaron Patterson
Commits
-
130c128Preparing for 6.1.2.1 release -
b5de7b3Prevent open redirect when allowed host starts with a dot - See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) -
@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language -
@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language -
@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language -
@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language -
@dependabot badge mewill comment on this PR with code to add a "Dependabot enabled" badge to your readme
Additionally, you can set the following in your Dependabot dashboard:
- Update frequency (including time of day and day of week)
- Pull request limits (per update run and/or open at any time)
- Automerge options (never/patch/minor, and dev/runtime dependencies)
- Out-of-range updates (receive only lockfile updates, if desired)
- Security updates (receive only security updates, if desired)