Miggo Logo

CVE-2020-36644: Inline SVG vulnerable to Cross-site Scripting

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.292%
Published
1/7/2023
Updated
10/20/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
inline_svgrubygems< 1.7.21.7.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the unescaped filename parameter in the placeholder method. The commit diff shows the fix adds ERB::Util.html_escape_once to sanitize the filename. This function constructs error messages displayed in HTML comments, and prior to patching, user-controlled input (filename) was directly embedded without sanitization, enabling XSS when the SVG file wasn't found. The added spec test explicitly verifies escaping of malicious input in this context.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility **s ***n *oun* in j*m*sm*rtin Inlin* SV* up to *.*.* *n* *l*ssi*i** *s pro*l*m*ti*. *****t** *y t*is vuln*r**ility is *n unknown *un*tion*lity o* t** *il* `li*/inlin*_sv*/**tion_vi*w/**lp*rs.r*` o* t** *ompon*nt `URL P*r*m*t*r **n*l*r

Reasoning

T** vuln*r**ility st*ms *rom t** un*s**p** *il*n*m* p*r*m*t*r in t** pl****ol**r m*t*o*. T** *ommit *i** s*ows t** *ix ***s *R*::Util.*tml_*s**p*_on** to s*nitiz* t** *il*n*m*. T*is *un*tion *onstru*ts *rror m*ss***s *ispl*y** in *TML *omm*nts, *n* p