CVE-2020-5267
19.03.2020, 18:15
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
Vendor | Product | Version |
---|---|---|
rubyonrails | actionview | 𝑥 < 5.2.4.2 |
rubyonrails | actionview | 6.0.0 ≤ 𝑥 < 6.0.2.2 |
debian | debian_linux | 8.0 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rails |
| ||||||||||||||||||||||||||
rails-4.0 |
| ||||||||||||||||||||||||||
ruby-actionpack-3.2 |
| ||||||||||||||||||||||||||
ruby-activemodel-3.2 |
| ||||||||||||||||||||||||||
ruby-activerecord-3.2 |
| ||||||||||||||||||||||||||
ruby-activesupport-3.2 |
| ||||||||||||||||||||||||||
ruby-rails-3.2 |
|
Common Weakness Enumeration
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)The software receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
References