Cross-site Scripting (XSS) Affecting rails package, versions <2:6.0.3.4+dfsg-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-RAILS-1558948
  • published9 Oct 2020
  • disclosed6 Jan 2021

Introduced: 9 Oct 2020

CVE-2020-8264  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:12 rails to version 2:6.0.3.4+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rails package and not the rails package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.

CVSS Base Scores

version 3.1