var-201312-0119
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. RubyGems i18n is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Versions prior to RubyGems i18n 0.6.6, and 0.5.1 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-2830-1 security@debian.org http://www.debian.org/security/ Florian Weiemr December 30, 2013 http://www.debian.org/security/faq
Package : ruby-i18n Vulnerability : cross-site scripting Problem type : remote Debian-specific: no CVE ID : CVE-2013-4492
Peter McLarnan discovered that the internationalization component of Ruby on Rails does not properly encode parameters in generated HTML code, resulting in a cross-site scripting vulnerability. This update corrects the underlying vulnerability in the i18n gem, as provided by the ruby-i18n package.
The oldstable distribution (squeeze) is not affected by this problem; the libi18n-ruby package does not contain the vulnerable code.
For the stable distribution (wheezy), this problem has been fixed in version 0.6.0-3+deb7u1.
For the unstable distribution (sid), this problem has been fixed in version 0.6.9-1.
We recommend that you upgrade your ruby-i18n packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJSwfRdAAoJEL97/wQC1SS+xwAH/iI7ga/tjp1b8r//lKu3BBt5 GClsPWVKd9TBEYGHTM2ipskSU9+EDOkt/vhWH9TK2C5BA0eo68b6I2Gg8Z+BQzGa SwfQmnIee/UX3gFi+mRnppyNp1WqAxEXvRNN/1JCiVevZAUEicnUx36xUn7paLIi T+I2iae9LrCrP11XtU0KzNeg3ktt5QOTvOHIjlsdXoDHqT8EzjGalk99qA4fVK0I FU2as0zhN6aZtnivhoIuc4P3u4XYoKhK7R4BL4bwW1KzSr4/LqZ2PAOLRexyWDwV HJdfcR3WyRvpuxQKVFU9XF+agjBhWU98B8BWaC7O7aTsFYpwtHdtRN6PGJgCXUA= =GovW -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "i18n", "scope": "lte", "trust": 1.0, "vendor": "i18n", "version": "0.6.5" }, { "model": "i18n", "scope": "lt", "trust": 0.8, "vendor": "sven fuchs", "version": "0.6.6" }, { "model": "i18n", "scope": "eq", "trust": 0.6, "vendor": "ruby i18n", "version": "0.6.5" }, { "model": "webyast", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.3" }, { "model": "studio onsite", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.3" }, { "model": "lifecycle management server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "1.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "13.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.3" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.2" }, { "model": "i18n", "scope": "eq", "trust": 0.3, "vendor": "rubygems", "version": "0.6.5" }, { "model": "i18n", "scope": "eq", "trust": 0.3, "vendor": "rubygems", "version": "0.5.0" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "4.0.1" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "4.0" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.13" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.12" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.11" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.10" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.8" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.7" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.6" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.4" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.12" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.11" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.9" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.8" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.7" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.6" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.5" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.4" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.1" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.0.6" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2.15" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.2" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.0.8" }, { "model": "on rails ruby on rails", "scope": "eq", "trust": 0.3, "vendor": "ruby", "version": "3.0.7" }, { "model": "software collections for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "0" }, { "model": "openstack", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "puppet enterprise", "scope": "eq", "trust": 0.3, "vendor": "puppetlabs", "version": "3.1" }, { "model": "chef", "scope": "eq", "trust": 0.3, "vendor": "opscode", "version": "11.1.2" }, { "model": "security network protection xgs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.1" }, { "model": "security network protection xgs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1" }, { "model": "security network protection xgs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1.2" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "i18n", "scope": "ne", "trust": 0.3, "vendor": "rubygems", "version": "0.6.6" }, { "model": "i18n", "scope": "ne", "trust": 0.3, "vendor": "rubygems", "version": "0.5.1" }, { "model": "on rails ruby on rails", "scope": "ne", "trust": 0.3, "vendor": "ruby", "version": "4.0.2" }, { "model": "on rails ruby on rails", "scope": "ne", "trust": 0.3, "vendor": "ruby", "version": "3.2.16" }, { "model": "puppet enterprise", "scope": "ne", "trust": 0.3, "vendor": "puppetlabs", "version": "3.1.1" }, { "model": "chef", "scope": "ne", "trust": 0.3, "vendor": "opscode", "version": "11.1.3" } ], "sources": [ { "db": "BID", "id": "64076" }, { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:ruby:*:*", "cpe_name": [], "versionEndIncluding": "0.6.5", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-4492" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Peter McLarnan of Matasano Security.", "sources": [ { "db": "BID", "id": "64076" } ], "trust": 0.3 }, "cve": "CVE-2013-4492", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-4492", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-4492", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201312-124", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call. RubyGems i18n is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. \nVersions prior to RubyGems i18n 0.6.6, and 0.5.1 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2830-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weiemr\nDecember 30, 2013 http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ruby-i18n\nVulnerability : cross-site scripting\nProblem type : remote\nDebian-specific: no\nCVE ID : CVE-2013-4492\n\nPeter McLarnan discovered that the internationalization component of\nRuby on Rails does not properly encode parameters in generated HTML\ncode, resulting in a cross-site scripting vulnerability. This update\ncorrects the underlying vulnerability in the i18n gem, as provided by\nthe ruby-i18n package. \n\nThe oldstable distribution (squeeze) is not affected by this problem;\nthe libi18n-ruby package does not contain the vulnerable code. \n\nFor the stable distribution (wheezy), this problem has been fixed in\nversion 0.6.0-3+deb7u1. \n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 0.6.9-1. \n\nWe recommend that you upgrade your ruby-i18n packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niQEcBAEBAgAGBQJSwfRdAAoJEL97/wQC1SS+xwAH/iI7ga/tjp1b8r//lKu3BBt5\nGClsPWVKd9TBEYGHTM2ipskSU9+EDOkt/vhWH9TK2C5BA0eo68b6I2Gg8Z+BQzGa\nSwfQmnIee/UX3gFi+mRnppyNp1WqAxEXvRNN/1JCiVevZAUEicnUx36xUn7paLIi\nT+I2iae9LrCrP11XtU0KzNeg3ktt5QOTvOHIjlsdXoDHqT8EzjGalk99qA4fVK0I\nFU2as0zhN6aZtnivhoIuc4P3u4XYoKhK7R4BL4bwW1KzSr4/LqZ2PAOLRexyWDwV\nHJdfcR3WyRvpuxQKVFU9XF+agjBhWU98B8BWaC7O7aTsFYpwtHdtRN6PGJgCXUA=\n=GovW\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "BID", "id": "64076" }, { "db": "PACKETSTORM", "id": "124627" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-4492", "trust": 2.8 }, { "db": "BID", "id": "64076", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2013-005372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201312-124", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "124627", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "64076" }, { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "PACKETSTORM", "id": "124627" }, { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "id": "VAR-201312-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.24090908 }, "last_update_date": "2023-12-18T11:10:16.683000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The I18n::MissingTranslation exception escapes key names for its html_message", "trust": 0.8, "url": "https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445" }, { "title": "[CVE-2013-4491] Reflective XSS Vulnerability in Ruby on Rails", "trust": 0.8, "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/plrh6duw998/blfeyio4k_ej" }, { "title": "Rails 3.2.16 and 4.0.2 have been released!", "trust": 0.8, "url": "http://weblog.rubyonrails.org/2013/12/3/rails_3_2_16_and_4_0_2_have_been_released/" }, { "title": "i18n", "trust": 0.8, "url": "http://rubygems.org/gems/i18n" }, { "title": "lib-i18n-exceptions.rb", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=46892" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "NVD", "id": "CVE-2013-4492" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00093.html" }, { "trust": 1.6, "url": "http://weblog.rubyonrails.org/2013/12/3/rails_3_2_16_and_4_0_2_have_been_released/" }, { "trust": 1.6, "url": "http://www.debian.org/security/2013/dsa-2830" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/64076" }, { "trust": 1.6, "url": "https://github.com/svenfuchs/i18n/commit/92b57b1e4f84adcdcc3a375278f299274be62445" }, { "trust": 1.6, "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/plrh6duw998/blfeyio4k_ej" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4492" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4492" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2013-4492" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2017:0320" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhba-2015:1100" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2018:0380" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1036922" }, { "trust": 0.3, "url": "http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/" }, { "trust": 0.3, "url": "http://puppetlabs.com/security/cve/cve-2013-4491" }, { "trust": 0.3, "url": "http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/" }, { "trust": 0.3, "url": "http://www.rubyonrails.com/" }, { "trust": 0.3, "url": "rubygems.org/gems/i18n" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2014-0008.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2013-1794.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21665279" }, { "trust": 0.3, "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20140734-1.html" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4492" } ], "sources": [ { "db": "BID", "id": "64076" }, { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "PACKETSTORM", "id": "124627" }, { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "64076" }, { "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "db": "PACKETSTORM", "id": "124627" }, { "db": "NVD", "id": "CVE-2013-4492" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-12-03T00:00:00", "db": "BID", "id": "64076" }, { "date": "2013-12-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "date": "2013-12-31T14:01:56", "db": "PACKETSTORM", "id": "124627" }, { "date": "2013-12-07T00:55:03.663000", "db": "NVD", "id": "CVE-2013-4492" }, { "date": "2013-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-13T21:56:00", "db": "BID", "id": "64076" }, { "date": "2013-12-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005372" }, { "date": "2023-02-13T04:47:02.933000", "db": "NVD", "id": "CVE-2013-4492" }, { "date": "2023-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-124" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201312-124" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ruby for i18n gem of exceptions.rb Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "xss", "sources": [ { "db": "PACKETSTORM", "id": "124627" }, { "db": "CNNVD", "id": "CNNVD-201312-124" } ], "trust": 0.7 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.