An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses.
References
Link | Resource |
---|---|
https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221118-0002/ | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5372 | |
https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20221118-0002/ | Third Party Advisory |
https://www.debian.org/security/2023/dsa-5372 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 - Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20221118-0002/ - Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5372 - |
Information
Published : 2022-05-26 17:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22577
Mitre link : CVE-2022-22577
CVE.ORG link : CVE-2022-22577
JSON object : View
Products Affected
debian
- debian_linux
rubyonrails
- actionpack
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')