Skip to content

Commit 8340380

Browse files
committed
Combined/deleted duplicate httparty gem advisory as part of PR#585
1 parent d6ea35a commit 8340380

File tree

2 files changed

+16
-29
lines changed

2 files changed

+16
-29
lines changed

gems/httparty/CVE-2024-22049.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,21 @@ description: |
1616
1717
Content-Disposition: form-data; name="avatar"; filename="overwrite_name_field_and_extension.sh"; name="foo"; dummy=".txt"
1818
19+
## GHSA version of Description
20+
21+
"multipart/form-data request tampering vulnerability"
22+
caused by Content-Disposition "filename" lack of escaping in httparty.
23+
24+
`httparty/lib/httparty/request` > `body.rb` > `def generate_multipart`
25+
26+
https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
27+
28+
By exploiting this problem, the following attacks are possible
29+
30+
* An attack that rewrites the \"name\" field according to the
31+
crafted file name, impersonating (overwriting) another field.
32+
* Attacks that rewrite the filename extension at the time
33+
multipart/form-datais generated by tampering with the filename.
1934
cvss_v3: 6.5
2035
patched_versions:
2136
- ">= 0.21.0"
@@ -25,4 +40,5 @@ related:
2540
- https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
2641
- https://github.com/jnunemaker/httparty/commit/cdb45a678c43e44570b4e73f84b1abeb5ec22b8e
2742
- https://github.com/jnunemaker/httparty/blob/4416141d37fd71bdba4f37589ec265f55aa446ce/lib/httparty/request/body.rb#L43
43+
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556711
2844
- https://github.com/advisories/GHSA-5pq7-52mg-hr42

gems/httparty/GHSA-5pq7-52mg-hr42.yml

Lines changed: 0 additions & 29 deletions
This file was deleted.

0 commit comments

Comments
 (0)