| Summary | The cross-site scripting (XSS) prevention feature in Ruby on Rails 2.x before 2.3.12, 3.0.x before 3.0.8, and 3.1.x before 3.1.0.rc2 does not properly handle mutation of safe buffers, which makes it easier for remote attackers to conduct XSS attacks via crafted strings to an application that uses a problematic string method, as demonstrated by the sub method. |
|---|---|
| Publication Date | July 1, 2011, 12:55 a.m. |
| Registration Date | Jan. 28, 2021, 4:38 p.m. |
| Last Update | Nov. 21, 2024, 10:27 a.m. |
| CVSS2.0 : MEDIUM | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | はい |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:rubyonrails:rails:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.9:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.3.11:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.0.0:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.0.0:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:2.0.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:* | |||||
| cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:* | |||||
| Title | Ruby on Rails のクロスサイトスクリプティング制限機能におけるクロスサイトスクリプティングの脆弱性 |
|---|---|
| Summary | Ruby on Rails のクロスサイトスクリプティング制限機能は、安全なバッファの変異を適切に処理しないため、クロスサイトスクリプティングの脆弱性が存在します。 |
| Possible impacts | 攻撃者により、問題のある文字列のメソッドを使用するアプリケーションに対し、巧妙に細工された文字列を介して、 クロスサイトスクリプティング攻撃をされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | June 8, 2011, midnight |
| Registration Date | March 27, 2012, 6:43 p.m. |
| Last Update | March 27, 2012, 6:43 p.m. |
| Ruby on Rails project |
| Rails 2.3.12 未満の 2.x、3.0.8 未満の 3.0.x、および 3.1.0.rc2 未満の 3.1.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年03月27日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |