{
  "threat_severity" : "Moderate",
  "public_date" : "2023-06-27T00:00:00Z",
  "bugzilla" : {
    "description" : "actionpack: Possible XSS via User Supplied Values to redirect_to",
    "id" : "2217785",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2217785"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-79",
  "details" : [ "The redirect_to method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header.", "A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Satellite 6.14 for RHEL 8",
    "release_date" : "2023-12-14T00:00:00Z",
    "advisory" : "RHSA-2023:7851",
    "cpe" : "cpe:/a:redhat:satellite:6.14::el8",
    "package" : "rubygem-actionpack-0:6.1.7.4-1.el8sat"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat 3scale API Management Platform 2",
    "fix_state" : "Will not fix",
    "package_name" : "3scale-amp-system-container",
    "cpe" : "cpe:/a:redhat:red_hat_3scale_amp:2"
  }, {
    "product_name" : "Red Hat 3scale API Management Platform 2",
    "fix_state" : "Affected",
    "package_name" : "3scale-amp-zync-container",
    "cpe" : "cpe:/a:redhat:red_hat_3scale_amp:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2023-28362\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-28362\nhttps://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml" ],
  "name" : "CVE-2023-28362",
  "csaw" : false
}