Vulnerability Details : CVE-2020-36644
A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file lib/inline_svg/action_view/helpers.rb of the component URL Parameter Handler. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The identifier of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2020-36644
- cpe:2.3:a:inline_svg_project:inline_svg:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36644
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36644
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
VulDB | |
3.5
|
LOW | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
2.1
|
1.4
|
VulDB | |
3.5
|
LOW | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N |
2.1
|
1.4
|
VulDB | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2020-36644
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: cna@vuldb.com (Primary)
References for CVE-2020-36644
-
https://github.com/jamesmartin/inline_svg/pull/117
Escape filename to avoid XSS from malicious input by pbyrne · Pull Request #117 · jamesmartin/inline_svg · GitHubPatch
-
https://github.com/jamesmartin/inline_svg/commit/f5363b351508486021f99e083c92068cf2943621
Escape filename to avoid XSS from malicious input · jamesmartin/inline_svg@f5363b3 · GitHubPatch
-
https://github.com/jamesmartin/inline_svg/releases/tag/v1.7.2
Release v1.7.2 · jamesmartin/inline_svg · GitHubRelease Notes
-
https://vuldb.com/?id.217597
Third Party Advisory;VDB Entry
-
https://vuldb.com/?ctiid.217597
Third Party Advisory;VDB Entry
Jump to