CVE-2020-36644 – inline_svg
Package
Manager: gem
Name: inline_svg
Vulnerable Version: >=0 <1.7.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00103 pctl0.28904
Details
Inline SVG vulnerable to Cross-site Scripting A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file `lib/inline_svg/action_view/helpers.rb` of the component `URL Parameter Handler`. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability.
Metadata
Created: 2023-01-07T12:30:14Z
Modified: 2023-01-12T18:51:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-p33q-4h4m-j994/GHSA-p33q-4h4m-j994.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-p33q-4h4m-j994
Finding: F008
Auto approve: 1