Skip to content

Commit 8373460

Browse files
jasnowRubySec CI
authored andcommitted
Updated advisory posts against rubysec/ruby-advisory-db@c648bbf
1 parent de1759e commit 8373460

3 files changed

Lines changed: 107 additions & 2 deletions

File tree

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2026-41493 (yard): Possible arbitrary path traversal and file access via
4+
yard server'
5+
comments: false
6+
categories:
7+
- yard
8+
advisory:
9+
gem: yard
10+
cve: 2026-41493
11+
ghsa: 3jfp-46x4-xgfj
12+
url: https://github.com/lsegal/yard/security/advisories/GHSA-3jfp-46x4-xgfj
13+
title: Possible arbitrary path traversal and file access via yard server
14+
date: 2026-04-17
15+
description: |-
16+
### Impact
17+
18+
A path traversal vulnerability was discovered in YARD <= 0.9.41 when
19+
using yard server to serve documentation. This bug would allow
20+
unsanitized HTTP requests to access arbitrary files on the machine
21+
of a yard server host under certain conditions.
22+
23+
The original patch in [GHSA-xfhh-rx56-rxcr](https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr)
24+
was incorrectly applied.
25+
26+
### Patches
27+
28+
Please upgrade to YARD v0.9.42 immediately if you are relying on
29+
yard server to host documentation in any untrusted environments
30+
without WEBrick and rely on `--docroot`.
31+
32+
### Workarounds
33+
34+
For users who cannot upgrade, it is possible to perform path
35+
sanitization of HTTP requests at your webserver level. WEBrick,
36+
for example, can perform such sanitization by default (which
37+
you can use via yard server -s webrick), as can certain rules
38+
in your webserver configuration.
39+
cvss_v3: 7.5
40+
cvss_v4: 6.9
41+
patched_versions:
42+
- ">= 0.9.42"
43+
related:
44+
url:
45+
- https://nvd.nist.gov/vuln/detail/CVE-2026-41493
46+
- https://github.com/lsegal/yard/releases/tag/v0.9.42
47+
- https://github.com/lsegal/yard/security/advisories/GHSA-3jfp-46x4-xgfj
48+
- https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr
49+
- https://github.com/advisories/GHSA-3jfp-46x4-xgfj
50+
---

advisories/_posts/2026-05-07-CVE-2025-67202.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ advisory:
1515
date: 2026-05-07
1616
description: |-
1717
Sidekiq-cron thru 2.3.1, an open-source scheduling add-on for Sidekiq,
18-
is vulnerable to a cross-site scripting (xss) vulnerability via crafted
19-
URL being rended from cron.erb.
18+
is vulnerable to a cross-site scripting (xss) vulnerability via
19+
crafted URL being rended from cron.erb.
2020
cvss_v3: 6.1
2121
patched_versions:
2222
- ">= 2.4.0"
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2026-44511 (katalyst-koi): Session cookies can be replayed after user
4+
logout'
5+
comments: false
6+
categories:
7+
- katalyst-koi
8+
advisory:
9+
gem: katalyst-koi
10+
cve: 2026-44511
11+
ghsa: 4cx3-3c38-j9vv
12+
url: https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv
13+
title: Session cookies can be replayed after user logout
14+
date: 2026-05-07
15+
description: |-
16+
### Impact
17+
18+
Admin session cookies were not invalidated when an admin user logged
19+
out. An attacker with access to a valid admin session cookie could
20+
continue to access admin functionality after logout, until the
21+
cookie expired or session secrets were rotated.
22+
23+
This affects applications using Koi admin authentication where an
24+
admin session cookie may have been exposed, cached, intercepted, or
25+
otherwise retained after logout.
26+
27+
### Patches
28+
29+
The issue has been patched by recording admin logout time and
30+
rejecting any admin session cookie created before the user’s
31+
most recent logout.
32+
33+
Users should upgrade to the patched Koi releases once available.
34+
35+
### Workarounds
36+
37+
Katalyst Koi recommends upgrading to the latest available version,
38+
or back porting the changes released in 5.6.0/4.20.0
39+
40+
### Resources
41+
42+
This is an application of https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions .
43+
cvss_v3: 7.4
44+
patched_versions:
45+
- "~> 4.20.0"
46+
- ">= 5.6.0"
47+
related:
48+
url:
49+
- https://nvd.nist.gov/vuln/detail/CVE-2026-44511
50+
- https://github.com/katalyst/koi/commit/606b33c140a61b1a2b37878ca7504741ec68df33
51+
- https://github.com/katalyst/koi/commit/fdbfb404a9500f7fed33e03ab2eb7c2578f9652c
52+
- https://github.com/katalyst/koi/security/advisories/GHSA-4cx3-3c38-j9vv
53+
- https://guides.rubyonrails.org/v5.2.0/security.html#replay-attacks-for-cookiestore-sessions
54+
- https://github.com/advisories/GHSA-4cx3-3c38-j9vv
55+
---

0 commit comments

Comments
 (0)