{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2022-3704","title":"Title"},{"category":"description","text":"A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn't a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2022-3704","url":"https://www.suse.com/security/cve/CVE-2022-3704"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1204826 for CVE-2022-3704","url":"https://bugzilla.suse.com/1204826"}],"title":"SUSE CVE CVE-2022-3704","tracking":{"current_release_date":"2025-12-19T01:53:05Z","generator":{"date":"2024-06-04T12:47:01Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2022-3704","initial_release_date":"2024-06-04T12:47:01Z","revision_history":[{"date":"2024-06-04T12:47:01Z","number":"2","summary":"Current version"},{"date":"2025-01-01T03:24:41Z","number":"3","summary":"Current version"},{"date":"2025-02-15T04:04:42Z","number":"4","summary":"Current version"},{"date":"2025-02-16T07:53:59Z","number":"5","summary":"Current version"},{"date":"2025-03-15T07:57:01Z","number":"6","summary":"Current version"},{"date":"2025-04-25T03:55:08Z","number":"7","summary":"Current version"},{"date":"2025-05-01T06:06:44Z","number":"8","summary":"Current version"},{"date":"2025-07-08T00:12:26Z","number":"9","summary":"Current version"},{"date":"2025-12-17T01:40:24Z","number":"10","summary":"description changed"},{"date":"2025-12-19T01:53:05Z","number":"11","summary":"description changed"}],"status":"interim","version":"11"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP All-in-One 11 SP4","product":{"name":"SUSE Linux Enterprise Server for SAP All-in-One 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP All-in-One 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles_sap:11:sp4"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 8","product":{"name":"SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:8"}}},{"category":"product_name","name":"SUSE OpenStack Cloud Crowbar 9","product":{"name":"SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9","product_identification_helper":{"cpe":"cpe:/o:suse:suse-openstack-cloud-crowbar:9"}}},{"category":"product_version","name":"ruby2.1-rubygem-actionpack-4_2","product":{"name":"ruby2.1-rubygem-actionpack-4_2","product_id":"ruby2.1-rubygem-actionpack-4_2","product_identification_helper":{"purl":"pkg:rpm/suse/ruby2.1-rubygem@actionpack-4_2"}}},{"category":"product_version","name":"rubygem-actionpack-3_2","product":{"name":"rubygem-actionpack-3_2","product_id":"rubygem-actionpack-3_2","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem@actionpack-3_2"}}},{"category":"product_version","name":"rubygem-actionpack-4_2","product":{"name":"rubygem-actionpack-4_2","product_id":"rubygem-actionpack-4_2","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem@actionpack-4_2"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"ruby2.5-rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1:ruby2.5-rubygem-actionpack-5_1"},"product_reference":"ruby2.5-rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP1"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP1","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP1:rubygem-actionpack-5_1"},"product_reference":"rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP1"},{"category":"default_component_of","full_product_name":{"name":"ruby2.5-rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP2:ruby2.5-rubygem-actionpack-5_1"},"product_reference":"ruby2.5-rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP2"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP2","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP2:rubygem-actionpack-5_1"},"product_reference":"rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP2"},{"category":"default_component_of","full_product_name":{"name":"ruby2.5-rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-actionpack-5_1"},"product_reference":"ruby2.5-rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP3","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP3:rubygem-actionpack-5_1"},"product_reference":"rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP3"},{"category":"default_component_of","full_product_name":{"name":"ruby2.5-rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-actionpack-5_1"},"product_reference":"ruby2.5-rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-5_1 as component of SUSE Linux Enterprise High Availability Extension 15 SP4","product_id":"SUSE Linux Enterprise High Availability Extension 15 SP4:rubygem-actionpack-5_1"},"product_reference":"rubygem-actionpack-5_1","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 15 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2 as component of SUSE Linux Enterprise Server for SAP All-in-One 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP All-in-One 11 SP4:rubygem-actionpack-3_2"},"product_reference":"rubygem-actionpack-3_2","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP All-in-One 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"ruby2.1-rubygem-actionpack-4_2 as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-actionpack-4_2"},"product_reference":"ruby2.1-rubygem-actionpack-4_2","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-4_2 as component of SUSE OpenStack Cloud Crowbar 8","product_id":"SUSE OpenStack Cloud Crowbar 8:rubygem-actionpack-4_2"},"product_reference":"rubygem-actionpack-4_2","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 8"},{"category":"default_component_of","full_product_name":{"name":"ruby2.1-rubygem-actionpack-4_2 as component of SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-actionpack-4_2"},"product_reference":"ruby2.1-rubygem-actionpack-4_2","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 9"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-4_2 as component of SUSE OpenStack Cloud Crowbar 9","product_id":"SUSE OpenStack Cloud Crowbar 9:rubygem-actionpack-4_2"},"product_reference":"rubygem-actionpack-4_2","relates_to_product_reference":"SUSE OpenStack Cloud Crowbar 9"}]},"vulnerabilities":[{"cve":"CVE-2022-3704","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2022-3704"}],"notes":[{"category":"general","text":"A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn't a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.","title":"CVE description"}],"product_status":{"known_not_affected":["SUSE Linux Enterprise Server for SAP All-in-One 11 SP4:rubygem-actionpack-3_2","SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-actionpack-4_2","SUSE OpenStack Cloud Crowbar 8:rubygem-actionpack-4_2","SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-actionpack-4_2","SUSE OpenStack Cloud Crowbar 9:rubygem-actionpack-4_2"]},"references":[{"category":"external","summary":"CVE-2022-3704","url":"https://www.suse.com/security/cve/CVE-2022-3704"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1204826 for CVE-2022-3704","url":"https://bugzilla.suse.com/1204826"}],"remediations":[{"category":"no_fix_planned","details":"There is no fix planned for these products.\n","product_ids":["SUSE Linux Enterprise High Availability Extension 15 SP1:ruby2.5-rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP1:rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP2:ruby2.5-rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP2:rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP3:ruby2.5-rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP3:rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP4:ruby2.5-rubygem-actionpack-5_1","SUSE Linux Enterprise High Availability Extension 15 SP4:rubygem-actionpack-5_1"]}],"threats":[{"category":"impact","date":"2022-10-27T04:00:12Z","details":"moderate"}],"title":"CVE-2022-3704"}]}