Cross-site Scripting (XSS) Affecting actionpack package, versions < 3.1.2, >= 3.1< 3.0.11


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.3% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ACTIONPACK-20020
  • published16 Nov 2011
  • disclosed16 Nov 2011
  • creditSergey Nartimov

Introduced: 16 Nov 2011

CVE-2011-4319  (opens in a new tab)
CWE-79  (opens in a new tab)

Overview

actionpack is a web app builder and tester on Rails.

Affected versions of this Gem are vulnerable to Cross-site Scripting (XSS) attacks via the translate helper method. A cross-site scripting (XSS) flaw was found in the way the translate helper method of the Ruby on Rails performed HTML escaping of interpolated user input, when interpolation in combination with HTML-safe translations were used. A remote attacker could use this flaw to execute arbitrary HTML or web script by providing a specially-crafted input to Ruby on Rails application, using the ActionPack module and its translate helper method without explicit (application specific) sanitization of user provided input.

Details

<>

CVSS Scores

version 3.1