Skip to content

chore: update dependency activesupport to v7.2.3.1 [security]#283

Open
judo-ci wants to merge 1 commit intomasterfrom
chore/NONE/rubygems-activesupport-vulnerability
Open

chore: update dependency activesupport to v7.2.3.1 [security]#283
judo-ci wants to merge 1 commit intomasterfrom
chore/NONE/rubygems-activesupport-vulnerability

Conversation

@judo-ci
Copy link
Copy Markdown
Contributor

@judo-ci judo-ci commented Mar 24, 2026

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
activesupport (source, changelog) 7.2.37.2.3.1 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.


Rails Active Support has a possible XSS vulnerability in SafeBuffer#%

CVE-2026-33170 / GHSA-89vf-4333-qx8v

More information

Details

Impact

SafeBuffer#% does not propagate the @html_unsafe flag to the newly created buffer. If a SafeBuffer is mutated in place (e.g. via gsub!) and then formatted with % using untrusted arguments, the result incorrectly reports html_safe? == true, bypassing ERB auto-escaping and possibly leading to XSS.

Releases

The fixed releases are available at the normal locations.

Credit

This issue was responsibly reported by @​ch4n3-yoon

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Rails Active Support has a possible ReDoS vulnerability in number_to_delimited

CVE-2026-33169 / GHSA-cg4j-q9v8-6v38

More information

Details

Impact

NumberToDelimitedConverter used a regular expression with gsub! to insert thousands delimiters. This could produce quadratic time complexity on long digit strings.

Releases

The fixed releases are available at the normal locations.

Credit

This issue was responsibly reported by Hackerone researcher scyoon.

Severity

  • CVSS Score: 6.9 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Rails Active Support has a possible DoS vulnerability in its number helpers

CVE-2026-33176 / GHSA-2j26-frm8-cmj9

More information

Details

Impact

Active Support number helpers accept strings containing scientific notation (e.g. 1e10000), which when converted to a string could be expanded into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability.

Releases

The fixed releases are available at the normal locations.

Credit

This issue was responsibly reported by Hackerone researcher manun.

Severity

  • CVSS Score: 6.6 / 10 (Medium)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

rails/rails (activesupport)

v7.2.3.1: 7.2.3.1

Compare Source

Active Support

  • Reject scientific notation in NumberConverter

    [CVE-2026-33176]

    Jean Boussier

  • Fix SafeBuffer#% to preserve unsafe status

    [CVE-2026-33170]

    Jean Boussier

  • Improve performance of NumberToDelimitedConverter

    [CVE-2026-33169]

    Jean Boussier

Active Model

  • No changes.

Active Record

  • No changes.

Action View

  • Skip blank attribute names in tag helpers to avoid generating invalid HTML.

    [CVE-2026-33168]

    Mike Dalessio

Action Pack

  • No changes.

Active Job

  • No changes.

Action Mailer

  • No changes.

Action Cable

  • No changes.

Active Storage

  • Filter user supplied metadata in DirectUploadController

    [CVE-2026-33173]

    Jean Boussier

  • Configurable maxmimum streaming chunk size

    Makes sure that byte ranges for blobs don't exceed 100mb by default.
    Content ranges that are too big can result in denial of service.

    [CVE-2026-33174]

    Gannon McGibbon

  • Limit range requests to a single range

    [CVE-2026-33658]

    Jean Boussier

  • Prevent path traversal in DiskService.

    DiskService#path_for now raises an InvalidKeyError when passed keys with dot segments (".",
    ".."), or if the resolved path is outside the storage root directory.

    #path_for also now consistently raises InvalidKeyError if the key is invalid in any way, for
    example containing null bytes or having an incompatible encoding. Previously, the exception
    raised may have been ArgumentError or Encoding::CompatibilityError.

    DiskController now explicitly rescues InvalidKeyError with appropriate HTTP status codes.

    [CVE-2026-33195]

    Mike Dalessio

  • Prevent glob injection in DiskService#delete_prefixed.

    Escape glob metacharacters in the resolved path before passing to Dir.glob.

    Note that this change breaks any existing code that is relying on delete_prefixed to expand
    glob metacharacters. This change presumes that is unintended behavior (as other storage services
    do not respect these metacharacters).

    [CVE-2026-33202]

    Mike Dalessio

Action Mailbox

  • No changes.

Action Text

  • No changes.

Railties

  • No changes.

Guides

  • No changes.

  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate.

@judo-ci judo-ci added the dependencies Pull requests that update a dependency file label Mar 24, 2026
@judo-ci judo-ci changed the title chore: update dependency activesupport to v7.2.3.1 [security] chore: update dependency activesupport to v7.2.3.1 [security] - autoclosed Mar 27, 2026
@judo-ci judo-ci closed this Mar 27, 2026
@judo-ci judo-ci deleted the chore/NONE/rubygems-activesupport-vulnerability branch March 27, 2026 05:27
Signed-off-by: judo-ci <devops@judopay.com>
@judo-ci judo-ci changed the title chore: update dependency activesupport to v7.2.3.1 [security] - autoclosed chore: update dependency activesupport to v7.2.3.1 [security] Mar 31, 2026
@judo-ci judo-ci reopened this Mar 31, 2026
@judo-ci judo-ci force-pushed the chore/NONE/rubygems-activesupport-vulnerability branch 2 times, most recently from 105fe21 to 97cc67d Compare March 31, 2026 05:27
@sonarqubecloud
Copy link
Copy Markdown

Quality Gate Failed Quality Gate failed

Failed conditions
5 Security Hotspots
7.7% Coverage on New Code (required ≥ 80%)
4.9% Duplication on New Code (required ≤ 3%)
C Reliability Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Development

Successfully merging this pull request may close these issues.

1 participant