An XSS Vulnerability in Action Pack >= 5.2.0 and < 5.2.0 that could allow an attacker to bypass CSP for non HTML like responses.
References
| Link | Resource |
|---|---|
| https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20221118-0002/ | Third Party Advisory |
| https://www.debian.org/security/2023/dsa-5372 | |
| https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 | Patch Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20221118-0002/ | Third Party Advisory |
| https://www.debian.org/security/2023/dsa-5372 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 - Patch, Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20221118-0002/ - Third Party Advisory | |
| References | () https://www.debian.org/security/2023/dsa-5372 - |
14 Mar 2023, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | (CONFIRM) https://security.netapp.com/advisory/ntap-20221118-0002/ - Third Party Advisory |
18 Nov 2022, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/09/msg00002.html - Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
03 Sep 2022, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Jun 2022, 14:37
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
| References | (MISC) https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:rubyonrails:actionpack:*:*:*:*:*:ruby:*:* | |
| CWE | CWE-79 |
26 May 2022, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-05-26 17:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22577
Mitre link : CVE-2022-22577
CVE.ORG link : CVE-2022-22577
JSON object : View
Products Affected
rubyonrails
- actionpack
debian
- debian_linux
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
