<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">Security update for rubygem-actionpack-3_2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2022:15116-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-12-08T13:02:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-12-08T13:02:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-12-08T13:02:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-actionpack-3_2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rubygem-actionpack-3_2 fixes the following issues:

- CVE-2021-22885: Fixed Possible Information Disclosure / Unintended Method Execution in Action Pack (bsc#1185715).
- CVE-2016-2097: Fixed Possible Information Leak Vulnerability in Action View (bsc#968850).

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slewyst13-rubygem-actionpack-3_2-15116</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2022/suse-su-202215116-1/</URL>
      <Description>Link for SUSE-SU-2022:15116-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2022-December/013203.html</URL>
      <Description>E-Mail link for SUSE-SU-2022:15116-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185715</URL>
      <Description>SUSE Bug 1185715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/968850</URL>
      <Description>SUSE Bug 968850</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2097/</URL>
      <Description>SUSE CVE CVE-2016-2097 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-22885/</URL>
      <Description>SUSE CVE CVE-2021-22885 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE WebYast 1.3">
      <Branch Type="Product Name" Name="SUSE WebYast 1.3">
        <FullProductName ProductID="SUSE WebYast 1.3" CPE="cpe:/o:suse:webyast:1.3">SUSE WebYast 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-3_2-3.2.12-0.27.3.1">
      <FullProductName ProductID="rubygem-actionpack-3_2-3.2.12-0.27.3.1">rubygem-actionpack-3_2-3.2.12-0.27.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-actionpack-3_2-3.2.12-0.27.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE WebYast 1.3">
      <FullProductName ProductID="SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1">rubygem-actionpack-3_2-3.2.12-0.27.3.1 as a component of SUSE WebYast 1.3</FullProductName>
    </Relationship>
  </ProductTree>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.</Note>
    </Notes>
    <CVE>CVE-2016-2097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.8</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>5.3</BaseScoreV3>
        <VectorV3>CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-202215116-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2097.html</URL>
        <Description>CVE-2016-2097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963332</URL>
        <Description>SUSE Bug 963332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968850</URL>
        <Description>SUSE Bug 968850</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
  <vuln:Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A possible information disclosure / unintended method execution vulnerability in Action Pack &gt;= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.</Note>
    </Notes>
    <CVE>CVE-2021-22885</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:N/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2022/suse-su-202215116-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-22885.html</URL>
        <Description>CVE-2021-22885</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185715</URL>
        <Description>SUSE Bug 1185715</Description>
      </Reference>
    </References>
  </vuln:Vulnerability>
</cvrfdoc>
