Sha256: 4689806c5c22448d7a6695d1cedcc7f96d9b0cf05e6111c889f63153a7e75ee6

Contents?: true

Size: 1.02 KB

Versions: 6

Compression:

Stored size: 1.02 KB

Contents

---
gem: ember-source
cve: 2014-0046
url: https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ
title: Ember.js XSS Vulnerability With {{link-to}} Helper in Non-block Form
date: 2014-02-07
description: |
  In general, Ember.js escapes or strips any user-supplied content before
  inserting it in strings that will be sent to innerHTML.  However, a change made
  to the implementation of the {{link-to}} helper means that any user-supplied
  data bound to the {{link-to}} helper's title attribute will not be escaped
  correctly.

  In applications that use the {{link-to}} helper in non-block form and bind
  the title attribute to user-supplied content, a specially-crafted payload
  could execute arbitrary JavaScript in the context of the current domain
  ("XSS").

  All users running an affected release and binding user-supplied data to the
  {{link-to}} helper's title attribute should either upgrade or use one of the
  workarounds immediately.
patched_versions:
  - ~> 1.2.2
  - ">= 1.3.2"
unaffected_versions:
  - "< 1.2.0"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/ember-source/CVE-2014-0046.yml