GHSA-74hc-57m5-83ch

Suggest an improvement
Source
https://github.com/advisories/GHSA-74hc-57m5-83ch
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-74hc-57m5-83ch/GHSA-74hc-57m5-83ch.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-74hc-57m5-83ch
Aliases
Published
2022-12-22T12:30:17Z
Modified
2023-11-08T04:03:48.402102Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
text_helpers uses web link to untrusted target with window.opener access
Details

A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.2.0 can address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520.

Database specific
{
    "nvd_published_at": "2022-12-22T10:15:00Z",
    "github_reviewed_at": "2022-12-22T20:03:04Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1022",
        "CWE-266"
    ]
}
References

Affected packages

RubyGems / text_helpers

Package

Name
text_helpers
Purl
pkg:gem/text_helpers

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.1.0
Fixed
1.2.0

Affected versions

1.*

1.1.0
1.1.1