CVE-2022-3704

A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.
References
Link Resource
https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4 Patch Third Party Advisory
https://github.com/rails/rails/issues/46244 Exploit Issue Tracking Patch Third Party Advisory
https://vuldb.com/?id.212319 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:rails:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary ** DISPUTED ** A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team. A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.
CWE CWE-74
CWE-79

Information

Published : 2022-10-26 20:15

Updated : 2024-08-03 02:15


NVD link : CVE-2022-3704

Mitre link : CVE-2022-3704

CVE.ORG link : CVE-2022-3704


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-707

Improper Neutralization

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')