2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2015-7579" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2016-02-16T02:59:03.000" ,
2025-04-12 12:06:01 +00:00
"lastModified" : "2025-04-12T10:46:40.837" ,
"vulnStatus" : "Deferred" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class."
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de XSS in la gema rails-html-sanitizer 1.0.2 para Ruby on Rails 4.2.x y 5.x permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de una entidad HTML que no es manejada adecuadamente por la clase Rails::Html::FullSanitizer."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*" ,
"versionEndIncluding" : "1.0.2" ,
"matchCriteriaId" : "4CBB3D93-016A-43CA-9325-3F5D58DD4FD4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A68D41F-36A9-4B77-814D-996F4E48FA79"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "709A19A5-8FD1-4F9C-A38C-F06242A94D68"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "8104482C-E8F5-40A7-8B27-234FEF725FD0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CFF8677-EA00-4F7E-BFF9-272482206DB5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "85435026-9855-4BF4-A436-832628B005FD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "56C2308F-A590-47B0-9791-7865D189196F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "9A266882-DABA-4A4C-88E6-60E993EE0947"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83F1142C-3BFB-4B72-A033-81E20DB19D02"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FA738A1-227B-4665-B65E-666883FFAE96"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*" ,
"matchCriteriaId" : "10789A2D-6401-4119-BFBE-2EE4C16216D3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*" ,
"matchCriteriaId" : "70ABD462-7142-4831-8EB6-801EC1D05573"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "81D717DB-7C80-48AA-A774-E291D2E75D6E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "06B357FB-0307-4EFA-9C5B-3C2CDEA48584"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4BD8840-0F1C-49D3-B843-9CFE64948018"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "79D5B492-43F9-470F-BD21-6EFD93E78453"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "4EC1F602-D48C-458A-A063-4050BE3BB25F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6A1C015-56AD-489C-B301-68CF1DBF1BEF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "FD191625-ACE2-46B6-9AAD-12D682C732C2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "02C7DB56-267B-4057-A9BA-36D1E58C6282"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EC163D49-691B-4125-A983-6CF6F6D86DEE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68B537D1-1584-4D15-9C75-08ED4D45DC3A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E3B4233-E117-4E77-A60D-3DFD5073154D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF8F94CF-D504-4165-A69E-3F1198CB162A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*" ,
"matchCriteriaId" : "C8C25977-AB6C-45E1-8956-871EB31B36BA"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*" ,
"matchCriteriaId" : "5F0AB6B0-3506-4332-A183-309FAC4882CE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2016/01/25/12" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securitytracker.com/id/1034816" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ" ,
"source" : "secalert@redhat.com"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.openwall.com/lists/oss-security/2016/01/25/12" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securitytracker.com/id/1034816" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/OU9ugTZcbjc/uksRkSxZEgAJ" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}