Sha256: ec9ce13b0c212ae2dd80775f862654d8b776852fc9a21f022fb351b3a5e34796

Contents?: true

Size: 819 Bytes

Versions: 1

Compression:

Stored size: 819 Bytes

Contents

--- 
gem: actionpack
framework: rails
cve: 2012-1099
osvdb: 79727
url: https://nvd.nist.gov/vuln/detail/CVE-2012-1099
title:
  Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
  Manually Generated Select Tag Options XSS
date: 2012-03-01

description: |
  Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS) 
  attack. This flaw exists because the application does not validate manually
  generated 'select tag options' upon submission to
  actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a
  user to create a specially crafted request that would execute arbitrary
  script code in a user's browser within the trust relationship between their
  browser and the server.

cvss_v2: 4.3

patched_versions: 
  - ~> 3.0.12
  - ~> 3.1.4
  - ">= 3.2.2"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/actionpack/CVE-2012-1099.yml