8.8

CVE-2024-28121

Exploit
stimulus_reflex is a system to extend the capabilities of both Rails and Stimulus by intercepting user interactions and passing them to Rails over real-time websockets. In affected versions more methods than expected can be called on reflex instances. Being able to call some of them has security implications. To invoke a reflex a websocket message of the following shape is sent: `\"target\":\"[class_name]#[method_name]\",\"args\":[]`. The server will proceed to instantiate `reflex` using the provided `class_name` as long as it extends `StimulusReflex::Reflex`. It then attempts to call `method_name` on the instance with the provided arguments. This is problematic as `reflex.method method_name` can be more methods that those explicitly specified by the developer in their reflex class. A good example is the instance_variable_set method. This vulnerability has been patched in versions 3.4.2 and 3.5.0.rc4. Users unable to upgrade should: see the backing GHSA advisory for mitigation advice.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
StimulusreflexStimulusrelfex Version < 3.4.2
StimulusreflexStimulusrelfex Version3.5.0 Updatepre1
StimulusreflexStimulusrelfex Version3.5.0 Updatepre10
StimulusreflexStimulusrelfex Version3.5.0 Updatepre2
StimulusreflexStimulusrelfex Version3.5.0 Updatepre3
StimulusreflexStimulusrelfex Version3.5.0 Updatepre4
StimulusreflexStimulusrelfex Version3.5.0 Updatepre5
StimulusreflexStimulusrelfex Version3.5.0 Updatepre6
StimulusreflexStimulusrelfex Version3.5.0 Updatepre7
StimulusreflexStimulusrelfex Version3.5.0 Updatepre8
StimulusreflexStimulusrelfex Version3.5.0 Updatepre9
StimulusreflexStimulusrelfex Version3.5.0 Updaterc1
StimulusreflexStimulusrelfex Version3.5.0 Updaterc2
StimulusreflexStimulusrelfex Version3.5.0 Updaterc3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.4% 0.8
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-advisories@github.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.