CVE-2023-50724

Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:resque:resque:*:*:*:*:*:ruby:*:*

History

02 Jan 2024, 18:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Resque resque
Resque
References () https://github.com/resque/resque/pull/1687 - () https://github.com/resque/resque/pull/1687 - Patch
References () https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj - () https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj - Vendor Advisory
References () https://github.com/resque/resque/issues/1679 - () https://github.com/resque/resque/issues/1679 - Exploit, Issue Tracking, Mitigation, Third Party Advisory
CPE cpe:2.3:a:resque:resque:*:*:*:*:*:ruby:*:*

21 Dec 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-21 15:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-50724

Mitre link : CVE-2023-50724

CVE.ORG link : CVE-2023-50724


JSON object : View

Products Affected

resque

  • resque
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')