Resque (pronounced like "rescue") is a Redis-backed library for creating background jobs, placing those jobs on multiple queues, and processing them later. resque-web in resque versions before 2.1.0 are vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint. This issue has been patched in version 2.1.0.
References
Link | Resource |
---|---|
https://github.com/resque/resque/issues/1679 | Exploit Issue Tracking Mitigation Third Party Advisory |
https://github.com/resque/resque/pull/1687 | Patch |
https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj | Vendor Advisory |
Configurations
History
02 Jan 2024, 18:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
First Time |
Resque resque
Resque |
|
References | () https://github.com/resque/resque/pull/1687 - Patch | |
References | () https://github.com/resque/resque/security/advisories/GHSA-r8xx-8vm8-x6wj - Vendor Advisory | |
References | () https://github.com/resque/resque/issues/1679 - Exploit, Issue Tracking, Mitigation, Third Party Advisory | |
CPE | cpe:2.3:a:resque:resque:*:*:*:*:*:ruby:*:* |
21 Dec 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-21 15:15
Updated : 2024-02-28 20:54
NVD link : CVE-2023-50724
Mitre link : CVE-2023-50724
CVE.ORG link : CVE-2023-50724
JSON object : View
Products Affected
resque
- resque
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')