GHSA-wg9m-gw3h-hg83

Suggest an improvement
Source
https://github.com/advisories/GHSA-wg9m-gw3h-hg83
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-wg9m-gw3h-hg83/GHSA-wg9m-gw3h-hg83.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wg9m-gw3h-hg83
Aliases
Published
2019-07-16T00:42:27Z
Modified
2023-11-08T04:01:07.659688Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
field_test gem contains injection vulnerability
Details

The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).

Database specific
{
    "nvd_published_at": "2019-07-09T18:15:00Z",
    "cwe_ids": [
        "CWE-74"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2019-07-15T23:48:32Z"
}
References

Affected packages

RubyGems / field_test

Package

Name
field_test
Purl
pkg:gem/field_test

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.3.0
Fixed
0.3.1

Affected versions

0.*

0.3.0