Cross-site Scripting (XSS) Affecting mustache-js-rails package, versions < 2.0.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-MUSTACHEJSRAILS-20242
  • published16 Nov 2015
  • disclosed16 Nov 2015
  • creditUnknown

Introduced: 16 Nov 2015

CVE NOT AVAILABLE CWE-79  (opens in a new tab)

Overview

mustache-js-rails provides mustache.js and jQuery.mustache.js for Rails 3.1+.

The upstream 'mustache.js' node.js module was found to not properly escape backtick (`) and equals (=) signs, leading to possible content injection via attributes in templates. For example, <a href={{foo}}/> rendered with { foo: 'test.com onload=alert(1)' } results in <a href=test.com onload=alert(1)/>.

Details

<>

CVSS Scores

version 3.1