Cross-site Scripting (XSS) Affecting chargify2 package, versions >= 0.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-CHARGIFY2-20273
  • published26 Dec 2016
  • disclosed1 Sept 2014
  • creditDavid Cole

Introduced: 1 Sep 2014

CVE NOT AVAILABLE CWE-79  (opens in a new tab)

How to fix?

There is no fixed version for this vulnerability, but a fix was merged to the api_v2 branch.

Overview

chargify2 is am API V2 wrapper for chargify.

Affected versions of this gem do not sanitize user input, allowing the attacker to inject javascript: code snippets into the output. For example, the following input javascript&#x58document;alert(1) will result in alert(1) being executed when the user clicks on the link.

Details

<>

CVSS Scores

version 3.1