CERTFR-2026-AVI-0349

Vulnerability from certfr_avis - Published: 2026-03-24 - Updated: 2026-03-24

De multiples vulnérabilités ont été découvertes dans les produits Ruby on Rails. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Ruby on Rails activestorage activestorage versions 8.0.x antérieures à 8.0.4.1
Ruby on Rails activesupport activesupport versions antérieures à 7.2.3.1
Ruby on Rails actionview actionview versions 8.0.x antérieures à 8.0.4.1
Ruby on Rails actionpack actionpack versions 8.1.x antérieures à 8.1.2.1
Ruby on Rails activesupport activesupport versions 8.1.x antérieures à 8.1.2.1
Ruby on Rails actionview actionview versions 8.1.x antérieures à 8.1.2.1
Ruby on Rails actionview actionview versions antérieures à 7.2.3.1
Ruby on Rails activestorage activestorage versions antérieures à 7.2.3.1
Ruby on Rails activesupport activesupport versions 8.0.x antérieures à 8.0.4.1
Ruby on Rails activestorage activestorage versions 8.1.x antérieures à 8.1.2.1
References
Bulletin de sécurité Ruby on Rails 90912 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90911 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90910 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90913 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90906 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90908 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90903 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90904 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90909 2026-03-23 vendor-advisory
Bulletin de sécurité Ruby on Rails 90907 2026-03-23 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "activestorage versions 8.0.x ant\u00e9rieures \u00e0 8.0.4.1",
      "product": {
        "name": "activestorage",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "activesupport versions ant\u00e9rieures \u00e0 7.2.3.1",
      "product": {
        "name": "activesupport",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "actionview versions 8.0.x ant\u00e9rieures \u00e0 8.0.4.1",
      "product": {
        "name": "actionview",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "actionpack versions 8.1.x ant\u00e9rieures \u00e0 8.1.2.1",
      "product": {
        "name": "actionpack",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "activesupport versions 8.1.x ant\u00e9rieures \u00e0 8.1.2.1",
      "product": {
        "name": "activesupport",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "actionview versions 8.1.x ant\u00e9rieures \u00e0 8.1.2.1",
      "product": {
        "name": "actionview",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "actionview versions ant\u00e9rieures \u00e0 7.2.3.1",
      "product": {
        "name": "actionview",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "activestorage versions ant\u00e9rieures \u00e0 7.2.3.1",
      "product": {
        "name": "activestorage",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "activesupport versions 8.0.x ant\u00e9rieures \u00e0 8.0.4.1",
      "product": {
        "name": "activesupport",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    },
    {
      "description": "activestorage versions 8.1.x ant\u00e9rieures \u00e0 8.1.2.1",
      "product": {
        "name": "activestorage",
        "vendor": {
          "name": "Ruby on Rails",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2026-33202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33202"
    },
    {
      "name": "CVE-2026-33168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33168"
    },
    {
      "name": "CVE-2026-33658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33658"
    },
    {
      "name": "CVE-2026-33169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33169"
    },
    {
      "name": "CVE-2026-33195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33195"
    },
    {
      "name": "CVE-2026-33173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33173"
    },
    {
      "name": "CVE-2026-33176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33176"
    },
    {
      "name": "CVE-2026-33174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33174"
    },
    {
      "name": "CVE-2026-33167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33167"
    },
    {
      "name": "CVE-2026-33170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-33170"
    }
  ],
  "initial_release_date": "2026-03-24T00:00:00",
  "last_revision_date": "2026-03-24T00:00:00",
  "links": [],
  "reference": "CERTFR-2026-AVI-0349",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2026-03-24T00:00:00.000000"
    },
    {
      "description": "Correction des r\u00e9f\u00e9rences CVE",
      "revision_date": "2026-03-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Ruby on Rails. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Ruby on Rails",
  "vendor_advisories": [
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90912",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33168-possible-xss-vulnerability-in-action-view-tag-helpers/90912"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90911",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33169-possible-redos-vulnerability-in-number-to-delimited-in-active-support/90911"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90910",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33170-possible-xss-vulnerability-in-safebuffer-in-active-support/90910"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90913",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33167-possible-xss-vulnerability-in-action-pack-debug-exceptions/90913"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90906",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33658-possible-dos-vulnerability-in-active-storage-proxy-mode-via-multi-range-requests/90906"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90908",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33174-possible-dos-vulnerability-in-active-storage-proxy-mode-via-range-requests/90908"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90903",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33202-possible-glob-injection-in-active-storage-diskservice/90903"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90904",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33195-possible-path-traversal-in-active-storage-diskservice/90904"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90909",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33173-insufficient-filtering-of-metadata-in-active-storage-direct-uploads/90909"
    },
    {
      "published_at": "2026-03-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails 90907",
      "url": "https://discuss.rubyonrails.org/t/cve-2026-33176-possible-dos-vulnerability-in-active-support-number-helpers/90907"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…