Vulnerability Details : CVE-2020-5267
In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2020-5267
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:actionview:*:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:actionview:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-5267
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-5267
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST | |
4.8
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
1.7
|
2.7
|
NIST | |
4.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N |
1.0
|
2.7
|
GitHub, Inc. |
CWE ids for CVE-2020-5267
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Secondary)
-
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.Assigned by: security-advisories@github.com (Primary)
References for CVE-2020-5267
-
https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a
Patch;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2020/03/msg00022.html
[SECURITY] [DLA 2149-1] rails security updateMailing List;Third Party Advisory
-
https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv
Possible XSS vulnerability in ActionView · Advisory · rails/rails · GitHubExploit;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2020/03/19/1
oss-security - [CVE-2020-5267] Possible XSS vulnerability in ActionViewExploit;Mailing List;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/
[SECURITY] Fedora 33 Update: rubygem-actiontext-6.0.3.3-1.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00019.html
[security-announce] openSUSE-SU-2020:0627-1: moderate: Security update fMailing List;Third Party Advisory
Jump to