In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv | exploit third party advisory patch |
https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a | third party advisory patch |
http://www.openwall.com/lists/oss-security/2020/03/19/1 | mailing list patch exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html | mailing list third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/ | vendor advisory |