GHSA-HJP3-5G2Q-7JWW

Vulnerability from github – Published: 2023-05-01 14:00 – Updated: 2024-01-05 15:27
VLAI?
Summary
Race Condition leading to logging errors
Details

In certain setups with threaded web servers, Audited's use of Thread.current can incorrectly attributed audits to the wrong user.

Fixed in 5.3.3.

In March, @convisoappsec noticed that the library in question had a Race Condition problem, which caused logs to be registered at times with different users than those who performed the genuine actions.

  • The first issue we identified was from November 2021: https://github.com/collectiveidea/audited/issues/601
  • So the solution was implemented in the following Pull Request: https://github.com/collectiveidea/audited/pull/669
  • And the feature was published in version 5.3.3: RELEASE: https://github.com/collectiveidea/audited/pull/671
Show details on source website

{
  "affected": [
    {
      "package": {
        "ecosystem": "RubyGems",
        "name": "audited"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "4.0.0"
            },
            {
              "fixed": "5.3.3"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2024-22047"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-01T14:00:47Z",
    "nvd_published_at": null,
    "severity": "LOW"
  },
  "details": "In certain setups with threaded web servers, Audited\u0027s use of `Thread.current` can incorrectly attributed audits to the wrong user. \n\nFixed in 5.3.3. \n\nIn March, @convisoappsec noticed that the library in question had a Race Condition problem, which caused logs to be registered at times with different users than those who performed the genuine actions.\n\n- The first issue we identified was from November 2021: https://github.com/collectiveidea/audited/issues/601 \n- So the solution was implemented in the following Pull Request: https://github.com/collectiveidea/audited/pull/669 \n- And the feature was published in version 5.3.3: RELEASE: https://github.com/collectiveidea/audited/pull/671\n",
  "id": "GHSA-hjp3-5g2q-7jww",
  "modified": "2024-01-05T15:27:28Z",
  "published": "2023-05-01T14:00:47Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/collectiveidea/audited/security/advisories/GHSA-hjp3-5g2q-7jww"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22047"
    },
    {
      "type": "WEB",
      "url": "https://github.com/collectiveidea/audited/issues/601"
    },
    {
      "type": "WEB",
      "url": "https://github.com/collectiveidea/audited/pull/669"
    },
    {
      "type": "WEB",
      "url": "https://github.com/collectiveidea/audited/pull/671"
    },
    {
      "type": "WEB",
      "url": "https://github.com/collectiveidea/audited/commit/342734c9396d8f96d3165f1d8531c626139fa4c6"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/collectiveidea/audited"
    },
    {
      "type": "WEB",
      "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/audited/CVE-2024-22047.yml"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Race Condition leading to logging errors"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…