Lucene search

K
cve[email protected]CVE-2009-4214
HistoryDec 07, 2009 - 5:30 p.m.

CVE-2009-4214

2009-12-0717:30:00
CWE-79
web.nvd.nist.gov
70
cve
2009
4214
cross-site scripting
xss
vulnerability
ruby on rails
html::tokenizer
actionpack
html scanner
remote attackers
web script
html
ascii characters
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.7%

Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.

Affected configurations

NVD
Node
rubyonrailsrailsMatch2.3.2
OR
rubyonrailsrailsMatch2.3.3
OR
rubyonrailsrailsMatch2.3.4
Node
rubyonrailsrailsMatch0.9.1
OR
rubyonrailsrailsMatch0.9.2
OR
rubyonrailsrailsMatch0.9.3
OR
rubyonrailsrailsMatch0.9.4
OR
rubyonrailsrailsMatch0.9.4.1
OR
rubyonrailsrailsMatch0.10.0
OR
rubyonrailsrailsMatch0.10.1
OR
rubyonrailsrailsMatch0.11.0
OR
rubyonrailsrailsMatch0.11.1
OR
rubyonrailsrailsMatch0.12.0
OR
rubyonrailsrailsMatch0.12.1
OR
rubyonrailsrailsMatch0.13.0
OR
rubyonrailsrailsMatch0.13.1
OR
rubyonrailsrailsMatch0.14.1
OR
rubyonrailsrailsMatch0.14.2
OR
rubyonrailsrailsMatch0.14.3
OR
rubyonrailsrailsMatch0.14.4
OR
rubyonrailsrailsMatch1.0.0
OR
rubyonrailsrailsMatch1.1.0
OR
rubyonrailsrailsMatch1.1.1
OR
rubyonrailsrailsMatch1.1.2
OR
rubyonrailsrailsMatch1.1.3
OR
rubyonrailsrailsMatch1.1.4
OR
rubyonrailsrailsMatch1.1.5
OR
rubyonrailsrailsMatch1.1.6
OR
rubyonrailsrailsMatch1.2.0
OR
rubyonrailsrailsMatch1.2.1
OR
rubyonrailsrailsMatch1.2.2
OR
rubyonrailsrailsMatch1.2.3
OR
rubyonrailsrailsMatch1.2.4
OR
rubyonrailsrailsMatch1.2.5
OR
rubyonrailsrailsMatch1.2.6
OR
rubyonrailsrailsMatch1.9.5
OR
rubyonrailsrailsMatch2.0.0
OR
rubyonrailsrailsMatch2.0.0rc1
OR
rubyonrailsrailsMatch2.0.0rc2
OR
rubyonrailsrailsMatch2.0.1
OR
rubyonrailsrailsMatch2.0.2
OR
rubyonrailsrailsMatch2.0.4
OR
rubyonrailsrailsMatch2.1.0
OR
rubyonrailsrailsMatch2.1.1
OR
rubyonrailsruby_on_railsRange2.1.2
OR
rubyonrailsruby_on_railsMatch0.5.0
OR
rubyonrailsruby_on_railsMatch0.5.5
OR
rubyonrailsruby_on_railsMatch0.5.6
OR
rubyonrailsruby_on_railsMatch0.5.7
OR
rubyonrailsruby_on_railsMatch0.6.0
OR
rubyonrailsruby_on_railsMatch0.6.5
OR
rubyonrailsruby_on_railsMatch0.7.0
OR
rubyonrailsruby_on_railsMatch0.8.0
OR
rubyonrailsruby_on_railsMatch0.8.5
OR
rubyonrailsruby_on_railsMatch0.9.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

70.7%