logo

CVE-2022-27777 actionview

Package

Manager: gem
Name: actionview
Vulnerable Version: >=0 <5.2.7.1 || >=6.0.0 <6.0.4.8 || >=6.1.0 <6.1.5.1 || >=7.0.0 <7.0.2.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.017 pctl0.8157

Details

XSS Vulnerability in Action View tag helpers There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact If untrusted data is passed as the hash key for tag attributes, there is a possibility that the untrusted data may not be properly escaped which can lead to an XSS vulnerability. Impacted code will look something like this: ``` check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' }) ``` Where the "malicious_input" variable contains untrusted data. All users running an affected release should either upgrade or use one of the workarounds immediately. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Escape the untrusted data before using it as a key for tag helper methods.

Metadata

Created: 2022-04-27T22:32:49Z
Modified: 2023-06-07T15:35:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-ch3h-j2vf-95pv/GHSA-ch3h-j2vf-95pv.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-ch3h-j2vf-95pv
Finding: F008
Auto approve: 1