You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* refactor edit SEP form to show selected option (#6096)
* refactor build_fieldset_choices and build_input_hash
* lint fix
* enhance script to transition consumer role states to fully verified (#6103)
* enhance script to transition consumer role states to fully verified
* refactor to introduce batching
* lint fix
* refactor CSV handling in transition consumers script to append results and improve error logging
* refactor
* set new rop due date for bulk calls (#6102)
* save
* updates evidence spec
* remove utils changes, add specs
* update specs
* remove binding
* fix error
* add specs for non esi bulk calls
* remove local adjustments to run spec
---------
Co-authored-by: Sai Praveen Gudimetla <saipraveen.gudimetla@gmail.com>
* add devise to bundler audit ignore (#6098)
* address gap in pvc logic (#6100)
* save
* updates evidence spec
* separate rrv other bulk call updates
---------
Co-authored-by: Sai Praveen Gudimetla <saipraveen.gudimetla@gmail.com>
* remove custom handling on remove qhp applicant modal (#6108)
Co-authored-by: Alec Turnbull <alecturnbull81@gmail.com>
* refactor access verification logic in FamiliesController (#6115)
* refactor access verification logic in FamiliesController
* fix spec
* remediate CVE-2026-33306 with bcrypt bump to 3.1.22 (#6120)
CVE-2026-33306 bcrypt minor version uplift
* data fix ridp verified consumers with bad bookmark url (#6121)
* data fix for bad bookmark urls
* update scope of fix to all ridp verified with bad bookmark
* rubocop fix
* set admin bookmark url to nil
* security: fix bundler-audit vulnerabilities (activestorage) (#6133)
fix: update gems to resolve bundler-audit security vulnerabilities
This commit updates vulnerable gems identified by bundler-audit.
See PR description for detailed analysis of changes and affected components.
---------
Co-authored-by: Jacob Kagon <69021620+jacobkagon@users.noreply.github.com>
Co-authored-by: Tristan <33517218+TristanB17@users.noreply.github.com>
Co-authored-by: Sai Praveen Gudimetla <saipraveen.gudimetla@gmail.com>
Co-authored-by: Alec Turnbull <alecturnbull81@gmail.com>
Co-authored-by: Michael Karamanov <mdkaramanov@gmail.com>
Co-authored-by: Marco (Polo) Ornelas <marco.ornelas@ideacrew.com>
**Vulnerability:** A race condition in Devise's Confirmable module allows an attacker to confirm an email address they do not own. This affects any Devise application using the reconfirmable option (the default when using Confirmable with email changes). (`CVE-2026-32700`).
8
+
9
+
**Current Status:** Enroll is currently pinned to devise `4.5.x` through the `Gemfile`.
10
+
11
+
**Mitigation:** This CVE is temporarily added to `.bundler-audit.yml` as we are upgrading Rails 8 in parallel. The long-term fix is to upgrade `rails` to `>= 7.0` and devise to `5.0.3` simultaneously.
12
+
13
+
**Actions Taken:**
14
+
1. Documented vulnerability and mitigation plan in this file.
15
+
2. Added `GHSA-57hq-95w6-v4fc` to bundler-audit ignore list as a temporary exception.
16
+
3. Tracked follow-up to remove the exception after Ruby upgrade.
17
+
18
+
**Ongoing Measures:**
19
+
1. Keep this exception time boxed for 90 days as Rails 8 upgrade is coming soon.
20
+
2. Remove the ignore entry after dependency upgrade.
**Vulnerability:** Nokogiri versions below `1.19.1` will not raise an exception when canonicalization fails, specifically when checking the return value of `xmlC14NExecute` in the associated canonicalization methods (`GHSA-wx95-c6cv-8532`).
@@ -244,6 +262,38 @@ We backported the upstream restriction that disallows the dangerous transformati
244
262
1. When we upgrade Rails Version to ~> 7.1.5.2', '~> 7.2.2.2', '>= 8.0.2.1', we need to remove
Rails Active Storage has a possible DoS vulnerability in proxy mode via multi-range requests. This affects ActiveStorage versions in Rails 6.1.7.10 and below.
273
+
```
274
+
275
+
**Mitigation:**
276
+
277
+
Active Storage is NOT ENABLED in this application. The Active Storage engine is explicitly disabled in `config/application.rb` (line 12 is commented out). This CVE requires upgrading Rails from 6.1.x to 7.2.3.1+, 8.0.4.1+, or 8.1.2.1+ (major version upgrade).
278
+
279
+
**Risk Assessment:**
280
+
-**Severity**: Not Applicable
281
+
-**Actual Risk**: None - Active Storage is not loaded or used
282
+
-**Impact**: No impact as the vulnerable component is not present
283
+
284
+
**Actions Taken:**
285
+
286
+
1. Verified Active Storage is disabled in config/application.rb
287
+
2. Confirmed no config/storage.yml exists
288
+
3. Confirmed no models use has_one_attached or has_many_attached
289
+
4. Added CVE-2026-33658 to .bundler-audit.yml ignore list
290
+
5. Documented reason for ignoring: requires major Rails version upgrade
291
+
292
+
**TODO - Future Actions**
293
+
294
+
1. When we upgrade Rails to ~> 7.2.3.1, ~> 8.0.4.1, or >= 8.1.2.1, remove CVE-2026-33658 from .bundler-audit.yml
295
+
2. If Active Storage is ever enabled in the future, ensure patched Rails version is used
0 commit comments