You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the j or escape_javascript methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
CVE-2020-5267 - Medium Severity Vulnerability
Simple, battle-tested conventions and helpers for building web pages.
Library home page: https://rubygems.org/gems/actionview-4.1.0.gem
Path to dependency file: /tmp/ws-scm/app1/Gemfile.lock
Path to vulnerable library: /var/lib/gems/2.5.0/cache/actionview-4.1.0.gem
Dependency Hierarchy:
Found in HEAD commit: 9d946faa10e3050193fb56220287f7565773de83
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the
j
orescape_javascript
methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.Publish Date: 2020-03-19
URL: CVE-2020-5267
Base Score Metrics:
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5267
Release Date: 2020-03-19
Fix Resolution: actionview:6.0.2.2, 5.2.4.2
The text was updated successfully, but these errors were encountered: