Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g7xq-xv8c-h98c

Опубликовано: 17 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.1

Описание

Cross-site Scripting (XSS) possible due to improper sanitisation of href attributes on <a> tags

Summary

There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data.

Our filter to detect and prevent the use of the javascript: URL scheme in the href attribute of an <a> tag could be bypassed with tab \t or newline \n characters between the characters of the protocol, e.g. java\tscript:.

Impact

If you render an <a> tag with an href attribute set to a user-provided link, that link could potentially execute JavaScript when clicked by another user.

a(href: user_profile) { "Profile" }

Mitigation

The best way to mitigate this vulnerability is to update to one of the following versions:

Workarounds

Configuring a Content Security Policy that does not allow unsafe-inline would effectively prevent this vulnerability from being exploited.

Пакеты

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

= 1.10.0

1.10.1

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

>= 1.9.0, < 1.9.2

1.9.2

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

>= 1.8.0, < 1.8.3

1.8.3

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

>= 1.7.0, < 1.7.2

1.7.2

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

>= 1.6.0, < 1.6.3

1.6.3

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

>= 1.5.0, < 1.5.3

1.5.3

Наименование

phlex

rubygems
Затронутые версииВерсия исправления

< 1.4.2

1.4.2

EPSS

Процентиль: 40%
0.00179
Низкий

7.1 High

CVSS3

Дефекты

CWE-79
CWE-87

Связанные уязвимости

CVSS3: 7.1
nvd
почти 2 года назад

phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the `javascript:` URL scheme in the `href` attribute of an `<a>` tag could be bypassed with tab `\t` or newline `\n` characters between the characters of the protocol, e.g. `java\tscript:`. This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow `unsafe-inline` would effectively prevent this vulnerability from being exploited.

EPSS

Процентиль: 40%
0.00179
Низкий

7.1 High

CVSS3

Дефекты

CWE-79
CWE-87