Sha256: c8e460368cf39e4658bdb961659edbd0094403892992b47890eb01fa221b377f

Contents?: true

Size: 1.08 KB

Versions: 6

Compression:

Stored size: 1.08 KB

Contents

---
gem: ember-source
cve: 2015-7565
url: https://groups.google.com/forum/#!topic/ember-security/OfyQkoSuppY
title: Ember.js XSS Vulnerability with User-Supplied JSON
date: 2016-01-14
description: |
  By default, Ember will escape any values in Handlebars templates that
  use double curlies (`{{value}}`). Developers can specifically opt out of
  this escaping behavior by passing an instance of `SafeString` rather
  than a raw string, which tells Ember that it should not escape the
  string because the developer has taken responsibility for escapement.

  It is possible for an attacker to create a specially-crafted payload
  that causes a non-sanitized string to be treated as a `SafeString`, and
  thus bypass Ember's normal escaping behavior. This could allow an
  attacker to execute arbitrary JavaScript in the context of the current
  domain ("XSS").

  All users running an affected release should either upgrade or use of
  the workarounds immediately.
patched_versions:
  - ~> 1.11.4
  - ~> 1.12.2
  - ~> 1.13.12
  - ~> 2.0.3
  - ~> 2.1.2
  - ">= 2.2.1"
unaffected_versions:
  - "< 1.8.0"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/ember-source/CVE-2015-7565.yml