Cross-site Scripting (XSS) Affecting geminabox package, versions <0.13.10


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-GEMINABOX-20444
  • published13 Nov 2017
  • disclosed12 Nov 2017
  • creditYasin Soliman

Introduced: 12 Nov 2017

CVE-2017-16792  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade geminabox to version 0.13.10 or higher.

Overview

geminabox is a sinatra based gem hosting app, with client side gem push style functionality.

Affected versions of the package are vulnerable to Stored Cross-site Scripting (XSS) attacks. An attackers may be able to inject arbitrary web script via a crafted JavaScript URL in the homepage value of a .gemspec file. A .gemspec file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload to the Geminabox server, in order to achieve stored XSS via the gem hyperlink.

Details

<>

You can read more about Cross-site Scripting (XSS) on our blog.

CVSS Scores

version 3.1