Описание
Resque vulnerable to reflected XSS in Queue Endpoint
Impact
Reflected XSS can be performed using the current_queue portion of the path on the /queues endpoint of resque-web.
Patches
v2.6.0
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
Ссылки
- https://github.com/resque/resque/security/advisories/GHSA-r9mq-m72x-257g
- https://nvd.nist.gov/vuln/detail/CVE-2023-50727
- https://github.com/resque/resque/pull/1865
- https://github.com/resque/resque/commit/7623b8dfbdd0a07eb04b19fb25b16a8d6f087f9a
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50727.yml
Пакеты
resque
< 2.6.0
2.6.0
Связанные уязвимости
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. Reflected XSS issue occurs when /queues is appended with /"><svg%20onload=alert(domain)>. This issue has been patched in version 2.6.0.
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. Reflected XSS issue occurs when /queues is appended with /"><svg%20onload=alert(domain)>. This issue has been patched in version 2.6.0.