Описание
actionpack Cross-site Scripting vulnerability
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2013-1855
- https://access.redhat.com/errata/RHSA-2013:0698
- https://access.redhat.com/errata/RHSA-2014:1863
- https://access.redhat.com/security/cve/CVE-2013-1855
- https://bugzilla.redhat.com/show_bug.cgi?id=921331
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2013-1855.yml
- https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain
- https://web.archive.org/web/20130609174600/http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- https://web.archive.org/web/20131109010518/http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2013-0698.html
- http://rhn.redhat.com/errata/RHSA-2014-1863.html
- http://support.apple.com/kb/HT5784
- http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released
Пакеты
actionpack
< 2.3.18
2.3.18
actionpack
>= 3.0.0, < 3.1.12
3.1.12
actionpack
>= 3.2.0, < 3.2.13
3.2.13
Связанные уязвимости
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
The sanitize_css method in lib/action_controller/vendor/html-scanner/h ...