Potential false positive: CVE-2024-54133 reported for actionpack 7.2.3 #9873
-
QuestionHi! Trivy reports CVE-2024-54133 for the Ruby gem actionpack version 7.2.3, although according to the official Rails security advisory and public CVE data, this version should not be affected. Trivy version: 0.62.1
TargetNone ScannerVulnerability Output FormatJSON ModeNone Operating SystemNo response Version0.62.1 |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
|
Hello @bukreevdanil09-stack Even with an older Trivy version (v0.62.1), I’m not able to reproduce it: ➜ cat Gemfile.lock
GEM
remote: https://rubygems.org/
specs:
actionpack (7.2.3)
PLATFORMS
x86_64-linux
DEPENDENCIES
actionpack (= 7.2.3)
BUNDLED WITH
2.5.11
➜ docker run -it --rm -v ./Gemfile.lock:/test/Gemfile.lock aquasec/trivy:0.62.1 -q fs /test -f json --list-all-pkgs
{
"SchemaVersion": 2,
"CreatedAt": "2025-12-04T07:16:13.157828048Z",
"ArtifactName": "/test",
"ArtifactType": "filesystem",
"Metadata": {
"ImageConfig": {
"architecture": "",
"created": "0001-01-01T00:00:00Z",
"os": "",
"rootfs": {
"type": "",
"diff_ids": null
},
"config": {}
}
},
"Results": [
{
"Target": "Gemfile.lock",
"Class": "lang-pkgs",
"Type": "bundler",
"Packages": [
{
"ID": "[email protected]",
"Name": "actionpack",
"Identifier": {
"PURL": "pkg:gem/[email protected]",
"UID": "fe1f4b81ba9ff8f3"
},
"Version": "7.2.3",
"Relationship": "direct",
"Layer": {},
"Locations": [
{
"StartLine": 4,
"EndLine": 4
}
]
}
]
}
]
}Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.


The Ruby repo updated this CVE two months ago — https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-54133.yml
The patched version was specified as
~> 7.2.2.1.Version 7.2.3 is not included in this range.
That is why Trivy reported this vulnerability.
Please make sure to keep your trivy-db up to date.
Otherwise, there is a chance that you may not receive updated data (as in this case) or new advisories.