GHSA-8qwh-rm6c-jv96

Suggest an improvement
Source
https://github.com/advisories/GHSA-8qwh-rm6c-jv96
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-8qwh-rm6c-jv96/GHSA-8qwh-rm6c-jv96.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8qwh-rm6c-jv96
Aliases
Published
2022-12-27T12:30:20Z
Modified
2024-03-01T14:41:05.174762Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Oxidized Web vulnerable to Cross-site Scripting
Details

A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability.

References

Affected packages

RubyGems / oxidized-web

Package

Name
oxidized-web
Purl
pkg:gem/oxidized-web

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Last affected
0.13.1

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.1.0
0.1.1
0.1.2
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.5.2
0.6.0
0.6.1
0.7.0
0.7.1
0.8.0
0.9.0
0.9.1
0.9.2
0.9.3
0.10.0
0.10.1
0.10.2
0.11.0
0.11.1
0.12.0
0.12.1
0.13.0
0.13.1