Lucene search

K
cve[email protected]CVE-2024-21636
HistoryJan 04, 2024 - 8:15 p.m.

CVE-2024-21636

2024-01-0420:15:25
CWE-79
web.nvd.nist.gov
87
cve-2024-21636
view_component
ruby on rails
cross-site scripting
vulnerability
nvd

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 and 2.83.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a #call method (i.e. instead of using a sidecar template) are affected. The return value of the #call method is not sanitized and can include user-defined content. In addition, the return value of the #output_postamble methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 and 2.83.0 have been released and fully mitigate both the #call and the #output_postamble vulnerabilities. As a workaround, sanitize the return value of #call.

Affected configurations

Vulners
NVD
Node
viewcomponentview_componentRange3.0.03.9.0
OR
viewcomponentview_componentRange<2.83.0
VendorProductVersionCPE
viewcomponentview_component*cpe:2.3:a:viewcomponent:view_component:*:*:*:*:*:*:*:*
viewcomponentview_component*cpe:2.3:a:viewcomponent:view_component:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "ViewComponent",
    "product": "view_component",
    "versions": [
      {
        "version": ">= 3.0.0, < 3.9.0",
        "status": "affected"
      },
      {
        "version": "< 2.83.0",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.6%

Related for CVE-2024-21636