6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.2 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.4%
view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 and 2.83.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a #call
method (i.e. instead of using a sidecar template) are affected. The return value of the #call
method is not sanitized and can include user-defined content. In addition, the return value of the #output_postamble
methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 and 2.83.0 have been released and fully mitigate both the #call
and the #output_postamble
vulnerabilities. As a workaround, sanitize the return value of #call
.
github.com/ViewComponent/view_component/commit/0d26944a8d2730ea40e60eae23d70684483e5017
github.com/ViewComponent/view_component/commit/c43d8bafa7117cbce479669a423ab266de150697
github.com/ViewComponent/view_component/pull/1950
github.com/ViewComponent/view_component/pull/1962
github.com/ViewComponent/view_component/security/advisories/GHSA-wf2x-8w6j-qw37
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.2 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
20.4%