Lucene search

K
githubGitHub Advisory DatabaseGHSA-Q759-HWVC-M3JG
HistoryOct 24, 2017 - 6:33 p.m.

actionpack Cross-site Scripting vulnerability

2017-10-2418:33:37
CWE-79
GitHub Advisory Database
github.com
34

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.9%

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

Affected configurations

Vulners
Node
actionpack_projectactionpackRange<3.2.13ruby
OR
actionpack_projectactionpackRange<3.1.12ruby
OR
actionpack_projectactionpackRange<2.3.18ruby

References

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.9%