Cross-site Scripting (XSS) Affecting ruby-actionpack-3.2 package, versions <3.2.6-5


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.41% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU1404-RUBYACTIONPACK32-310758
  • published19 Mar 2013
  • disclosed19 Mar 2013

Introduced: 19 Mar 2013

CVE-2013-1855  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Ubuntu:14.04 ruby-actionpack-3.2 to version 3.2.6-5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-actionpack-3.2 package and not the ruby-actionpack-3.2 package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.

CVSS Scores

version 3.1