The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - | |
References | () http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-0698.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1863.html - | |
References | () http://support.apple.com/kb/HT5784 - | |
References | () http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/ - | |
References | () https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain - |
Information
Published : 2013-03-19 22:55
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1855
Mitre link : CVE-2013-1855
CVE.ORG link : CVE-2013-1855
JSON object : View
Products Affected
rubyonrails
- rails
- ruby_on_rails
redhat
- enterprise_linux
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')