Lucene search

K
rubygemsRubySecRUBY:CHARTKICK-2019-12732
HistoryJun 03, 2019 - 9:00 p.m.

XSS Vulnerability in Chartkick Ruby Gem

2019-06-0321:00:00
RubySec
github.com
11

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Chartkick is vulnerable to a cross-site scripting (XSS) attack if
both the following conditions are met:

Condition 1:
It’s used with ActiveSupport.escape_html_entities_in_json = false
(this is not the default for Rails)
OR used with a non-Rails framework like Sinatra.

Condition 2:
Untrusted data or options are passed to a chart.

<%= line_chart params[:data], min: params[:min] %>

Affected configurations

Vulners
Node
rubychartkickRange3.2.0
VendorProductVersionCPE
rubychartkick*cpe:2.3:a:ruby:chartkick:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS3

4.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N

Related for RUBY:CHARTKICK-2019-12732