CVE-2020-11082 – kaminari
Package
Manager: gem
Name: kaminari
Vulnerable Version: >=0 <1.2.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00452 pctl0.62853
Details
Cross-Site Scripting in Kaminari ### Impact In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1. ### Releases The 1.2.1 gem including the patch has already been released. All past released versions are affected by this vulnerability. ### Workarounds Application developers who can't update the gem can workaround by overriding the `PARAM_KEY_EXCEPT_LIST` constant. ```ruby module Kaminari::Helpers PARAM_KEY_EXCEPT_LIST = [:authenticity_token, :commit, :utf8, :_method, :script_name, :original_script_name].freeze end ``` ### Credits Thanks to Daniel Mircea for finding the issue and sending a patch via GitHub. Also thanks to Aditya Prakash for reporting the vulnerability.
Metadata
Created: 2020-05-28T21:10:11Z
Modified: 2021-09-23T13:55:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/05/GHSA-r5jw-62xg-j433/GHSA-r5jw-62xg-j433.json
CWE IDs: ["CWE-79"]
Alternative ID: GHSA-r5jw-62xg-j433
Finding: F425
Auto approve: 1