CVE-2011-2932 – activesupport
Package
Manager: gem
Name: activesupport
Vulnerable Version: >=2.0.0 <2.3.13 || >=3.0.0 <3.0.10
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00813 pctl0.73388
Details
activesupport Cross-site Scripting vulnerability Cross-site scripting (XSS) vulnerability in `activesupport/lib/active_support/core_ext/string/output_safety.r`b in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
Metadata
Created: 2017-10-24T18:33:38Z
Modified: 2023-05-12T17:06:32Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-9fh3-vh3h-q4g3/GHSA-9fh3-vh3h-q4g3.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-9fh3-vh3h-q4g3
Finding: F008
Auto approve: 1