{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"None"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"rubygem-actionpack security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for rubygem-actionpack is now available for openEuler-22.03-LTS-SP1",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Eases web-request routing, handling, and response as a half-way front, half-way page controller. Implemented with specific emphasis on enabling easy unit/integration testing that doesn't require a browser.\n\nSecurity Fix(es):\n\nA Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.(CVE-2023-28362)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for rubygem-actionpack is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Low",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"rubygem-actionpack",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2024-2465",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2465"
			},
			{
				"summary":"CVE-2023-28362",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-28362&packageName=rubygem-actionpack"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28362"
			},
			{
				"summary":"openEuler-SA-2024-2465 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openeuler-sa-2024-2465.json"
			}
		],
		"title":"An update for rubygem-actionpack is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2024-11-22T22:22:59+08:00",
			"revision_history":[
				{
					"date":"2024-11-22T22:22:59+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-11-22T22:22:59+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-11-22T22:22:59+08:00",
			"id":"openEuler-SA-2024-2465",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
									"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm"
								},
								"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
									"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
									"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
					"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
					"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch",
					"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-28362",
			"notes":[
				{
					"text":"A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
					],
					"details":"rubygem-actionpack security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2465"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"NONE",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
					]
				}
			],
			"threats":[
				{
					"details":"None",
					"category":"impact"
				}
			],
			"title":"CVE-2023-28362"
		}
	]
}