Sha256: 760ded196f0c6f436ded97d89616c161104039ed633f09ffb1977620bf44b767

Contents?: true

Size: 725 Bytes

Versions: 1

Compression:

Stored size: 725 Bytes

Contents

---
url: http://www.osvdb.org/show/osvdb/79727
title: Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb Manually Generated Select Tag Options XSS

description: >
  Ruby on Rails contains a flaw that allows a remote cross-site
  scripting (XSS) attack. This flaw exists because the application does
  not validate manually generated 'select tag options' upon submission
  to actionpack/lib/action_view/helpers/form_options_helper.rb. This may
  allow a user to create a specially crafted request that would execute
  arbitrary script code in a user's browser within the trust
  relationship between their browser and the server.

cvss_v2: 4.3

patched_versions:
  - ~> 3.0.12
  - ~> 3.1.4
  - ">= 3.2.2"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.1.1 data/bundler/audit/rails/2012-1099.yml