Miggo Logo

CVE-2014-0046:
ember-source Cross-site Scripting vulnerability

2.6

CVSS Score

Basic Information

EPSS Score
0.65707%
Published
8/28/2018
Updated
9/27/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
AV:N/AC:H/Au:N/C:N/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
ember-sourcerubygems>= 1.2.0, < 1.2.21.2.2
ember-sourcerubygems>= 1.3.0, < 1.3.21.3.2
ember-sourcerubygems>= 1.4.0-beta.1, < 1.4.0-beta.61.4.0-beta.6

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the link-to helper's handling of title attributes in non-block form. The commit diffs show the fix added escaping via Handlebars.Utils.escapeExpression to the title value processing path. Specifically, the anonymous function assigned to options.fn in the 'ID' linkType branch lacked proper escaping before the patch. The added test cases verify HTML escaping behavior for dynamic title values, confirming the vulnerability existed in the title attribute handling path of the link-to helper's implementation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* s*riptin* (XSS) vuln*r**ility in t** link-to **lp*r in *m**r.js *.*.x ***or* *.*.*, *.*.x ***or* *.*.*, *n* *.*.x ***or* *.*.*-**t*.*, w**n us** in non-*lo*k *orm, *llows r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ript or *TML vi* t** titl

Reasoning

T** vuln*r**ility st*ms *rom t** link-to **lp*r's **n*lin* o* titl* *ttri*ut*s in non-*lo*k *orm. T** *ommit *i**s s*ow t** *ix ***** *s**pin* vi* `**n*l***rs.Utils.*s**p**xpr*ssion` to t** titl* v*lu* pro**ssin* p*t*. Sp**i*i**lly, t** *nonymous `*u