Описание
Resque vulnerable to reflected XSS in resque-web failed and queues lists
Impact
The following paths in resque-web have been found to be vulnerable to reflected XSS:
Patches
v2.2.1
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
Ссылки
- https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8
- https://nvd.nist.gov/vuln/detail/CVE-2023-50725
- https://github.com/resque/resque/pull/1790
- https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50725.yml
Пакеты
resque
< 2.2.1
2.2.1
Связанные уязвимости
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.