Cross-site Scripting (XSS) Affecting activesupport package, versions < 3.2.2, >= 3.2< 3.1.4, >= 3.1< 3.0.12, >= 3.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.24% (64th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ACTIVESUPPORT-20025
  • published29 Feb 2012
  • disclosed29 Feb 2012
  • creditAkira Matsuda

Introduced: 29 Feb 2012

CVE-2012-1098  (opens in a new tab)
CWE-79  (opens in a new tab)

Overview

activesupport is toolkit of support libraries and Ruby core extensions extracted from the Rails frameworkץ

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). The application does not validate direct manipulations of SafeBuffer objects via '[]' and other methods. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.

Details

<>

CVSS Scores

version 3.1