CVE-2009-3009

Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x before 2.2.3, and 2.3.x before 2.3.4, allows remote attackers to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063
http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source Patch
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://secunia.com/advisories/36600 Vendor Advisory
http://secunia.com/advisories/36717 Vendor Advisory
http://securitytracker.com/id?1022824 Patch
http://support.apple.com/kb/HT4077
http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails
http://www.debian.org/security/2009/dsa-1887
http://www.osvdb.org/57666
http://www.securityfocus.com/bid/36278
http://www.vupen.com/english/advisories/2009/2544 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/53036
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063
http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source Patch
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://secunia.com/advisories/36600 Vendor Advisory
http://secunia.com/advisories/36717 Vendor Advisory
http://securitytracker.com/id?1022824 Patch
http://support.apple.com/kb/HT4077
http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails
http://www.debian.org/security/2009/dsa-1887
http://www.osvdb.org/57666
http://www.securityfocus.com/bid/36278
http://www.vupen.com/english/advisories/2009/2544 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/53036
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=545063 -
References () http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source - Patch () http://groups.google.com/group/rubyonrails-security/msg/7f57cd7794e1d1b4?dmode=source - Patch
References () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html - () http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html -
References () http://secunia.com/advisories/36600 - Vendor Advisory () http://secunia.com/advisories/36600 - Vendor Advisory
References () http://secunia.com/advisories/36717 - Vendor Advisory () http://secunia.com/advisories/36717 - Vendor Advisory
References () http://securitytracker.com/id?1022824 - Patch () http://securitytracker.com/id?1022824 - Patch
References () http://support.apple.com/kb/HT4077 - () http://support.apple.com/kb/HT4077 -
References () http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails - () http://weblog.rubyonrails.org/2009/9/4/xss-vulnerability-in-ruby-on-rails -
References () http://www.debian.org/security/2009/dsa-1887 - () http://www.debian.org/security/2009/dsa-1887 -
References () http://www.osvdb.org/57666 - () http://www.osvdb.org/57666 -
References () http://www.securityfocus.com/bid/36278 - () http://www.securityfocus.com/bid/36278 -
References () http://www.vupen.com/english/advisories/2009/2544 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/2544 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/53036 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/53036 -

Information

Published : 2009-09-08 18:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3009

Mitre link : CVE-2009-3009

CVE.ORG link : CVE-2009-3009


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')