Executive Summary
Summary | |
---|---|
Title | rails security update |
Informations | |||
---|---|---|---|
Name | DSA-2466 | First vendor Publication | 2012-05-09 |
Vendor | Debian | Last vendor Modification | 2012-05-09 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document. For the stable distribution (squeeze), this problem has been fixed in version 2.3.5-1.2+squeeze3. For the testing distribution (wheezy) and unstable distribution (sid), this problem has been fixed in version 2.3.14. We recommend that you upgrade your rails packages. |
Original Source
Url : http://www.debian.org/security/2012/dsa-2466 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19558 | |||
Oval ID: | oval:org.mitre.oval:def:19558 | ||
Title: | DSA-2466-1 rails - cross site scripting | ||
Description: | Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2466-1 CVE-2012-1099 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | rails |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-30 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-3166 File : nvt/gb_fedora_2012_3166_rubygem-actionpack_fc17.nasl |
2012-08-30 | Name : Fedora Update for rubygem-activesupport FEDORA-2012-3166 File : nvt/gb_fedora_2012_3166_rubygem-activesupport_fc17.nasl |
2012-08-24 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11870 File : nvt/gb_fedora_2012_11870_rubygem-actionpack_fc16.nasl |
2012-08-14 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-11353 File : nvt/gb_fedora_2012_11353_rubygem-actionpack_fc16.nasl |
2012-07-03 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-9636 File : nvt/gb_fedora_2012_9636_rubygem-actionpack_fc16.nasl |
2012-06-19 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-8912 File : nvt/gb_fedora_2012_8912_rubygem-actionpack_fc15.nasl |
2012-06-15 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-8883 File : nvt/gb_fedora_2012_8883_rubygem-actionpack_fc16.nasl |
2012-05-31 | Name : Debian Security Advisory DSA 2466-1 (rails) File : nvt/deb_2466_1.nasl |
2012-04-02 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-3355 File : nvt/gb_fedora_2012_3355_rubygem-actionpack_fc15.nasl |
2012-03-19 | Name : Fedora Update for rubygem-actionpack FEDORA-2012-3321 File : nvt/gb_fedora_2012_3321_rubygem-actionpack_fc16.nasl |
2012-03-19 | Name : Fedora Update for rubygem-activesupport FEDORA-2012-3321 File : nvt/gb_fedora_2012_3321_rubygem-activesupport_fc16.nasl |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-05-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2466.nasl - Type : ACT_GATHER_INFO |
2012-03-19 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-3321.nasl - Type : ACT_GATHER_INFO |
2012-03-19 | Name : The remote Fedora host is missing a security update. File : fedora_2012-3355.nasl - Type : ACT_GATHER_INFO |
2012-03-12 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2012-3166.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:31:03 |
|