CVE-2020-15169

In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:action_view_project:action_view:*:*:*:*:*:ruby:*:*
cpe:2.3:a:action_view_project:action_view:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-09-11 16:15

Updated : 2024-02-04 21:00


NVD link : CVE-2020-15169

Mitre link : CVE-2020-15169

CVE.ORG link : CVE-2020-15169


JSON object : View

Products Affected

action_view_project

  • action_view

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')