mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 03:02:46 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
65e33bb7b5
commit
83f3fd7350
@ -48,12 +48,14 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284"
|
||||
"refsource": "MISC",
|
||||
"url": "https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284",
|
||||
"name": "https://snyk.io/vuln/SNYK-RUBY-CLEARANCE-1577284"
|
||||
},
|
||||
{
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://github.com/thoughtbot/clearance/pull/945"
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/thoughtbot/clearance/pull/945",
|
||||
"name": "https://github.com/thoughtbot/clearance/pull/945"
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -61,7 +63,7 @@
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "This affects the package clearance before 2.5.0.\n The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com).\n"
|
||||
"value": "This affects the package clearance before 2.5.0. The vulnerability can be possible when users are able to set the value of session[:return_to]. If the value used for return_to contains multiple leading slashes (/////example.com) the user ends up being redirected to the external domain that comes after the slashes (http://example.com)."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
Loading…
x
Reference in New Issue
Block a user