Lucene search

K
rubygemsRubySecRUBY:ACTIVEADMIN-2023-50448
HistoryDec 14, 2023 - 9:00 p.m.

Potential CSV export data leak

2023-12-1421:00:00
RubySec
github.com
6
csv export
activeadmin
data leak
concurrency issue
private data
security vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

Impact

In ActiveAdmin versions prior to 2.12.0, a concurrency issue was
found that could allow a malicious actor to be able to access
potentially private data that belongs to another user.

The bug affects the functionality to export data as CSV files, and
was caused by a variable holding the collection to be exported being
shared across threads and not properly synchronized.

The attacker would need access to the same ActiveAdmin application
as the victim, and could exploit the issue by timing their request
immediately before when they know someone else will request a CSV
(e.g. via phishing) or request CSVs frequently and hope someone
else makes a concurrent request.

Patches

Versions 2.12.0 and above fixed the problem by completely
removing the shared state.

Affected configurations

Vulners
Node
rubyactiveadminRange2.12.0
VendorProductVersionCPE
rubyactiveadmin*cpe:2.3:a:ruby:activeadmin:*:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

AI Score

6.9

Confidence

Low

Related for RUBY:ACTIVEADMIN-2023-50448