8.8
CVE-2024-28121
- EPSS 1.4%
- Veröffentlicht 12.03.2024 20:15:08
- Zuletzt bearbeitet 03.12.2025 17:13:55
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
stimulus_reflex is a system to extend the capabilities of both Rails and Stimulus by intercepting user interactions and passing them to Rails over real-time websockets. In affected versions more methods than expected can be called on reflex instances. Being able to call some of them has security implications. To invoke a reflex a websocket message of the following shape is sent: `\"target\":\"[class_name]#[method_name]\",\"args\":[]`. The server will proceed to instantiate `reflex` using the provided `class_name` as long as it extends `StimulusReflex::Reflex`. It then attempts to call `method_name` on the instance with the provided arguments. This is problematic as `reflex.method method_name` can be more methods that those explicitly specified by the developer in their reflex class. A good example is the instance_variable_set method. This vulnerability has been patched in versions 3.4.2 and 3.5.0.rc4. Users unable to upgrade should: see the backing GHSA advisory for mitigation advice.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Stimulusreflex ≫ Stimulusrelfex Version < 3.4.2
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre1
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre10
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre2
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre3
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre4
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre5
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre6
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre7
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre8
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updatepre9
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updaterc1
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updaterc2
Stimulusreflex ≫ Stimulusrelfex Version3.5.0 Updaterc3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.4% | 0.8 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.