GHSA-x7p2-x2j6-mwhr

Source
https://github.com/advisories/GHSA-x7p2-x2j6-mwhr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/11/GHSA-x7p2-x2j6-mwhr/GHSA-x7p2-x2j6-mwhr.json
Aliases
Published
2017-11-29T23:19:51Z
Modified
2024-02-16T08:21:57.866595Z
Details

Stored cross-site scripting (XSS) vulnerability in Gemirro before 0.16.0 allows attackers to inject arbitrary web script via a crafted javascript: URL in the "homepage" value of a ".gemspec" file. A ".gemspec" file must be created with a JavaScript URL in the homepage value. This can be used to build a gem for upload to the Gemirro server, in order to achieve stored XSS via the author name hyperlink.

References

Affected packages

RubyGems / gemirro

Package

Name
gemirro

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
0.16.0

Affected versions

0.*

0.0.1
0.0.2
0.1.0
0.2.0
0.3.0
0.4.0
0.5.0
0.6.0
0.7.0
0.8.0
0.8.1
0.9.0
0.9.1
0.10.0
0.10.1
0.10.2
0.10.3
0.10.4
0.10.5
0.11.0
0.12.0
0.13.1
0.13.2
0.13.3
0.13.4
0.13.5
0.14.0
0.15.0