Sha256: 616a27d443922bb177772fbb614eee644563909990b58d5ae7fd354c9e9fc760
Contents?: true
Size: 1.26 KB
Versions: 1
Compression:
Stored size: 1.26 KB
Contents
--- gem: kaminari cve: 2020-11082 ghsa: r5jw-62xg-j433 url: https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433 date: 2020-05-28 title: Cross-Site Scripting in Kaminari via `original_script_name` parameter description: |- ### Impact There was a vulnerability in versions of Kaminari that would allow an attacker to inject arbitrary code into pages with pagination links. For example, an attacker could craft pagination links that link to other domain or host: https://example.com/posts?page=4&original_script_name=https://another-host.example.com In addition, an attacker could also craft pagination links that include JavaScript code that runs when a user clicks the link: https://example.com/posts?page=4&original_script_name=javascript:alert(42)%3b// ### Releases The 1.2.1 gem including the patch has already been released. All past released versions are affected by this vulnerability. ### Workarounds Application developers who can't update the gem can workaround by overriding the `PARAM_KEY_EXCEPT_LIST` constant. ```ruby module Kaminari::Helpers PARAM_KEY_EXCEPT_LIST = [:authenticity_token, :commit, :utf8, :_method, :script_name, :original_script_name].freeze end ``` cvss_v3: 6.4 patched_versions: - ">= 1.2.1"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/kaminari/CVE-2020-11082.yml |