Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q759-hwvc-m3jg

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

actionpack Cross-site Scripting vulnerability

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

Пакеты

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

< 2.3.18

2.3.18

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 3.0.0, < 3.1.12

3.1.12

Наименование

actionpack

rubygems
Затронутые версииВерсия исправления

>= 3.2.0, < 3.2.13

3.2.13

EPSS

Процентиль: 67%
0.00536
Низкий

Дефекты

CWE-79

Связанные уязвимости

ubuntu
почти 13 лет назад

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

redhat
почти 13 лет назад

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

nvd
почти 13 лет назад

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

debian
почти 13 лет назад

The sanitize_css method in lib/action_controller/vendor/html-scanner/h ...

EPSS

Процентиль: 67%
0.00536
Низкий

Дефекты

CWE-79