GHSA-9CHR-4FJH-5RGW
Vulnerability from github – Published: 2022-10-27 12:00 – Updated: 2023-01-23 20:44
VLAI?
Summary
Cross-site Scripting in actionpack
Details
actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this commit.
This vulnerability is disputed by the Rails security team. It requires that the developer is tricked into copy pasting a malicious javascript-containing string into a development-only error page accessible only via localhost.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionpack"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-3704"
],
"database_specific": {
"cwe_ids": [
"CWE-707",
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2022-10-28T19:17:53Z",
"nvd_published_at": "2022-10-26T20:15:00Z",
"severity": "LOW"
},
"details": "actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this [commit](https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4). \n\nThis vulnerability is disputed by the Rails security team. It requires that the developer is tricked into copy pasting a malicious javascript-containing string into a development-only error page accessible only via localhost.",
"id": "GHSA-9chr-4fjh-5rgw",
"modified": "2023-01-23T20:44:50Z",
"published": "2022-10-27T12:00:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3704"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/issues/46244"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/issues/46244#issuecomment-1380875153"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/pull/46269"
},
{
"type": "WEB",
"url": "https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4"
},
{
"type": "PACKAGE",
"url": "https://github.com/rails/rails"
},
{
"type": "WEB",
"url": "https://vuldb.com/?id.212319"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"type": "CVSS_V3"
}
],
"summary": "Cross-site Scripting in actionpack",
"withdrawn": "2023-01-23T20:44:50Z"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…