Cross-site Scripting (XSS) Affecting rails package, versions <2:6.0.3.4+dfsg-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (32nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN13-RAILS-5694520
  • published9 Oct 2020
  • disclosed6 Jan 2021

Introduced: 9 Oct 2020

CVE-2020-8264  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:13 rails to version 2:6.0.3.4+dfsg-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rails package and not the rails package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.

CVSS Scores

version 3.1