Sha256: bdccfbd02b8f6d83c91ae119c72d3f89b1ed3f2546619fe682555dce13dfa54f
Contents?: true
Size: 614 Bytes
Versions: 1
Compression:
Stored size: 614 Bytes
Contents
--- gem: chartkick cve: 2019-12732 url: https://github.com/ankane/chartkick/issues/488 title: XSS Vulnerability in Chartkick Ruby Gem date: 2019-06-04 description: | Chartkick is vulnerable to a cross-site scripting (XSS) attack if both the following conditions are met: Condition 1: It's used with `ActiveSupport.escape_html_entities_in_json = false` (this is not the default for Rails) OR used with a non-Rails framework like Sinatra. Condition 2: Untrusted data or options are passed to a chart. <%= line_chart params[:data], min: params[:min] %> patched_versions: - ">= 3.2.0"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/chartkick/CVE-2019-12732.yml |