We found results for “”
CVE-2024-32463
Good to know:
Date: April 17, 2024
phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the "javascript:" URL scheme in the "href" attribute of an "<a>" tag could be bypassed with tab "\t" or newline "\n" characters between the characters of the protocol, e.g. "java\tscript:". This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow "unsafe-inline" would effectively prevent this vulnerability from being exploited.
Language: Ruby
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Top Fix
Upgrade Version
Upgrade to version phlex - 1.4.2;phlex - 1.6.3;phlex - 1.10.1;phlex - 1.5.3;phlex - 1.9.2;phlex - 1.7.2;phlex - 1.8.3
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


