CVE-2013-1857: actionpack Cross-site Scripting vulnerability
N/A
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.69231%
CWE
Published
10/24/2017
Updated
11/10/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
actionpack | rubygems | < 2.3.18 | 2.3.18 |
actionpack | rubygems | >= 3.0.0, < 3.1.12 | 3.1.12 |
actionpack | rubygems | >= 3.2.0, < 3.2.13 | 3.2.13 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of encoded colon characters in URL scheme validation. The patch information shows modifications to protocol_separator regex and contains_bad_protocols? method in HTML::WhiteListSanitizer class, specifically adding detection of various colon encodings. This function's failure to properly decode/validate these sequences enabled XSS via crafted schemes.