Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-0B6CF026F67000BC98D5CEFA146C7484
HistoryMar 13, 2012 - 12:00 a.m.

XSS via posted select tag options

2012-03-1300:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
17

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

68.2%

Ruby on Rails is vulnerable to remote cross-site scripting because the application does not validate manually generated select tag options upon submission to actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user’s browser within the trust relationship between their browser and the server.

Affected configurations

Vulners
Node
gemactionpackRange3.0.0.alpha0
OR
gemactionpackRange<3.0.12
OR
gemactionpackRange3.1.0.alpha0
OR
gemactionpackRange<3.1.4
OR
gemactionpackRange3.2.0.alpha0
OR
gemactionpackRange<3.2.2

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

68.2%