Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-5267


In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.


Published

2020-03-19T18:15:16.023

Last Modified

2024-11-21T05:33:48.103

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

6.8

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-80
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application rubyonrails actionview < 5.2.4.2 Yes
Application rubyonrails actionview < 6.0.2.2 Yes
Operating System debian debian_linux 8.0 Yes
Operating System fedoraproject fedora 33 Yes
Operating System opensuse leap 15.1 Yes

References