Описание
Resque Scheduler Reflected XSS In Delayed Jobs View
Impact
Resque Scheduler version 1.27.4 and above are affected by a cross-site scripting vulnerability. A remote attacker can inject javascript code to the "{schedule_job}" or "args" parameter in /resque/delayed/jobs/{schedule_job}?args={args_id} to execute javascript at client side.
Patches
Fixed in v4.10.2
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
Ссылки
- https://github.com/resque/resque-scheduler/security/advisories/GHSA-9hmq-fm33-x4xx
- https://nvd.nist.gov/vuln/detail/CVE-2022-44303
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque-scheduler/CVE-2022-44303.yml
- https://trungvm.gitbook.io/cves/resque/resque-1.27.4-multiple-reflected-xss-in-resque-schedule-job
Пакеты
resque-scheduler
>= 1.27.4, < 4.10.2
4.10.2
Связанные уязвимости
Resque Scheduler version 1.27.4 is vulnerable to Cross-site scripting (XSS). A remote attacker could inject javascript code to the "{schedule_job}" or "args" parameter in /resque/delayed/jobs/{schedule_job}?args={args_id} to execute javascript at client side.