{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"NONE"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28362"
			},
			{
				"summary":"CVE-2023-28362 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2023/csaf-openeuler-cve-2023-28362.json"
			},
			{
				"summary":"openEuler-SA-2024-2465",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2465"
			},
			{
				"summary":"CVE-2023-28362",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-28362&packageName=rubygem-actionpack"
			}
		],
		"title":"openEuler cve CVE-2023-28362",
		"tracking":{
			"initial_release_date":"2024-11-22T22:22:59+08:00",
			"revision_history":[
				{
					"date":"2024-11-22T22:22:59+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2024-11-22T22:22:59+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-11-22T22:22:59+08:00",
			"id":"CVE-2023-28362",
			"version":"1.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
									"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm"
								},
								"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
									"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
									"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm"
								},
								"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
					"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
					"name":"rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch",
					"name":"rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-28362",
			"notes":[
				{
					"text":"A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
					"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
					],
					"details":"rubygem-actionpack security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2465"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"NONE",
						"baseScore":4.7,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-6.1.4.1-7.oe2203sp1.noarch",
						"openEuler-22.03-LTS-SP1:rubygem-actionpack-doc-6.1.4.1-7.oe2203sp1.noarch"
					]
				}
			],
			"threats":[
				{
					"details":"None",
					"category":"impact"
				}
			],
			"title":"CVE-2023-28362"
		}
	]
}