Sha256: bdccfbd02b8f6d83c91ae119c72d3f89b1ed3f2546619fe682555dce13dfa54f

Contents?: true

Size: 614 Bytes

Versions: 1

Compression:

Stored size: 614 Bytes

Contents

---
gem: chartkick
cve: 2019-12732
url: https://github.com/ankane/chartkick/issues/488
title: XSS Vulnerability in Chartkick Ruby Gem
date: 2019-06-04
description: |
  Chartkick is vulnerable to a cross-site scripting (XSS) attack if
  both the following conditions are met:

  Condition 1:
    It's used with `ActiveSupport.escape_html_entities_in_json = false`
    (this is not the default for Rails)
    OR used with a non-Rails framework like Sinatra.

  Condition 2:
    Untrusted data or options are passed to a chart.

    <%= line_chart params[:data], min: params[:min] %>
patched_versions:
  - ">= 3.2.0"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/chartkick/CVE-2019-12732.yml