Sha256: c8ba753122071b94a914388c693c4227d4585b6317c6b57de7c757e465808935
Contents?: true
Size: 587 Bytes
Versions: 6
Compression:
Stored size: 587 Bytes
Contents
--- gem: mustache-js-rails osvdb: 131671 url: https://blog.srcclr.com/handlebars_vulnerability_research_findings/ title: mustache.js - quoteless attributes in templates can lead to XSS date: 2015-11-17 description: | The upstream 'mustache.js' node.js module was found to not properly escape backtick (`) and equals (=) characters, leading to possible content injection via attributes in templates. Example: * Template: <a href={{foo}}/> * Input: { 'foo' : 'test.com onload=alert(1)'} * Rendered result: <a href=test.com onload=alert(1)/> patched_versions: - ">= 2.0.3"
Version data entries
6 entries across 6 versions & 2 rubygems