GHSA-gc3j-vvwf-4rp8

Source
https://github.com/advisories/GHSA-gc3j-vvwf-4rp8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-gc3j-vvwf-4rp8/GHSA-gc3j-vvwf-4rp8.json
Aliases
Published
2023-12-18T19:34:06Z
Modified
2024-02-16T08:16:11.344395Z
Details

Impact

The following paths in resque-web have been found to be vulnerable to reflected XSS:

/failed/?class=<script>alert(document.cookie)</script>
/queues/>&lt;img src=a onerror=alert(document.cookie)>

Patches

v2.2.1

Workarounds

No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.

References

https://github.com/resque/resque/pull/1790

References

Affected packages

RubyGems / resque

Package

Name
resque

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
2.2.1

Affected versions

0.*

0.2.0

1.*

1.0.0
1.1.0
1.2.0
1.2.1
1.2.3
1.3.0
1.3.1
1.4.0
1.5.0
1.5.1
1.5.2
1.6.0
1.6.1
1.7.0
1.7.1
1.8.0
1.8.1
1.8.2
1.8.3
1.8.4
1.8.5
1.8.6
1.9.0
1.9.1
1.9.2
1.9.3
1.9.4
1.9.5
1.9.7
1.9.8
1.9.9
1.9.10
1.10.0
1.11.0
1.12.0
1.13.0
1.14.0
1.15.0
1.16.0
1.16.1
1.17.0
1.17.1
1.18.0
1.18.1
1.18.2
1.18.3
1.18.4
1.18.5
1.18.6
1.19.0
1.20.0
1.21.0
1.22.0
1.23.0
1.23.1
1.24.0
1.24.1
1.25.0.pre
1.25.0
1.25.1
1.25.2
1.26.pre.0
1.26.0
1.27.0
1.27.1
1.27.2
1.27.3
1.27.4

2.*

2.0.0
2.1.0
2.2.0