Skip to content

Commit 1433a5a

Browse files
1 parent f2e5a9c commit 1433a5a

2 files changed

Lines changed: 33 additions & 4 deletions

File tree

advisories/github-reviewed/2025/12/GHSA-j4pr-3wm6-xx2r/GHSA-j4pr-3wm6-xx2r.json

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-j4pr-3wm6-xx2r",
4-
"modified": "2025-12-30T21:07:15Z",
4+
"modified": "2026-04-24T13:42:05Z",
55
"published": "2025-12-30T21:07:14Z",
66
"aliases": [
77
"CVE-2025-61594"
88
],
99
"summary": "URI Credential Leakage Bypass over CVE-2025-27221",
1010
"details": "### Impact\n\nIn affected URI version, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials.\n\nWhen using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure.\n\nThe vulnerability affects the `uri` gem bundled with the following Ruby series:\n\n* 0.12.4 and earlier (bundled in Ruby 3.2 series)\n* 0.13.2 and earlier (bundled in Ruby 3.3 series)\n* 1.0.3 and earlier (bundled in Ruby 3.4 series)\n\n### Patches\n\nUpgrade to 0.12.5, 0.13.3 or 1.0.4\n\n### References\n\n* https://www.ruby-lang.org/en/news/2025/02/26/security-advisories/\n* https://hackerone.com/reports/2957667",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U"
@@ -74,6 +78,14 @@
7478
}
7579
],
7680
"references": [
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/ruby/uri/security/advisories/GHSA-j4pr-3wm6-xx2r"
84+
},
85+
{
86+
"type": "ADVISORY",
87+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61594"
88+
},
7789
{
7890
"type": "WEB",
7991
"url": "https://github.com/ruby/uri/commit/20157e3e29b125ff41f1d9662e2e3b1d066f5902"
@@ -86,6 +98,14 @@
8698
"type": "WEB",
8799
"url": "https://github.com/ruby/uri/commit/d3116ca66a3b1c97dc7577f9d2d6e353f391cd6a"
88100
},
101+
{
102+
"type": "WEB",
103+
"url": "https://hackerone.com/reports/2957667"
104+
},
105+
{
106+
"type": "ADVISORY",
107+
"url": "https://github.com/advisories/GHSA-22h5-pq3x-2gf2"
108+
},
89109
{
90110
"type": "PACKAGE",
91111
"url": "https://github.com/ruby/uri"
@@ -94,18 +114,23 @@
94114
"type": "WEB",
95115
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/uri/CVE-2025-61594.yml"
96116
},
117+
{
118+
"type": "WEB",
119+
"url": "https://www.ruby-lang.org/en/news/2025/02/26/security-advisories"
120+
},
97121
{
98122
"type": "WEB",
99123
"url": "https://www.ruby-lang.org/en/news/2025/10/07/uri-cve-2025-61594"
100124
}
101125
],
102126
"database_specific": {
103127
"cwe_ids": [
128+
"CWE-200",
104129
"CWE-212"
105130
],
106131
"severity": "LOW",
107132
"github_reviewed": true,
108133
"github_reviewed_at": "2025-12-30T21:07:14Z",
109-
"nvd_published_at": null
134+
"nvd_published_at": "2025-12-30T21:15:43Z"
110135
}
111136
}

advisories/github-reviewed/2026/04/GHSA-jg4p-7fhp-p32p/GHSA-jg4p-7fhp-p32p.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-jg4p-7fhp-p32p",
4-
"modified": "2026-04-06T23:43:40Z",
4+
"modified": "2026-04-24T13:43:15Z",
55
"published": "2026-04-04T04:23:03Z",
66
"aliases": [
77
"CVE-2026-35213"
88
],
99
"summary": "@hapi/content: Regular Expression Denial of Service (ReDoS) in HTTP header parsing",
10-
"details": "All versions of `@hapi/content` through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse `Content-Type` and `Content-Disposition` headers contain patterns susceptible to catastrophic backtracking.\n\n### Impact\n\nDenial of Service. An unauthenticated remote attacker can cause a Node.js process to become unresponsive by sending a single HTTP request with a maliciously crafted header value.\n\n### Patches\n\nFixed by tightening all three regular expressions to eliminate backtracking.\n\n### Workarounds\n\nThere are no known workarounds. Upgrade to the patched version.",
10+
"details": "All versions of `@hapi/content` through 6.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via crafted HTTP header values. Three regular expressions used to parse `Content-Type` and `Content-Disposition` headers contain patterns susceptible to catastrophic backtracking. This has been fixed in v6.0.1.\n\n### Impact\n\nDenial of Service. An unauthenticated remote attacker can cause a Node.js process to become unresponsive by sending a single HTTP request with a maliciously crafted header value.\n\n### Patches\n\nFixed by tightening all three regular expressions to eliminate backtracking.\n\n### Workarounds\n\nThere are no known workarounds. Upgrade to the patched version.",
1111
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
},
1216
{
1317
"type": "CVSS_V4",
1418
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"

0 commit comments

Comments
 (0)