CVE-2014-0081:
Rails vulnerable to Cross-site Scripting
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.74452%
CWE
Published
10/24/2017
Updated
11/8/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:N/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rails | rubygems | >= 3.0.0, < 3.2.17 | 3.2.17 |
rails | rubygems | >= 4.0.0, < 4.0.3 | 4.0.3 |
actionpack | rubygems | >= 3.0.0, < 3.2.17 | 3.2.17 |
actionpack | rubygems | >= 4.0.0, < 4.0.3 | 4.0.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unescaped parameters (format, negative_format, units) in Rails' number helpers. The commit diff shows the addition of ERB::Util.html_escape calls for these parameters in the escape_unsafe_options method. Tests in number_helper_test.rb validate XSS mitigation for these exact parameters. The functions are explicitly named in CVE-2014-0081 descriptions and patches, confirming their role in the vulnerability.