In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433 | third party advisory mitigation |
https://github.com/github/advisory-review/pull/1020 | broken link |
https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8 | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/09/msg00011.html | third party advisory mailing list |
https://www.debian.org/security/2021/dsa-5005 | third party advisory vendor advisory |