Lucene search

K
cve[email protected]CVE-2024-32463
HistoryApr 17, 2024 - 4:15 p.m.

CVE-2024-32463

2024-04-1716:15:09
CWE-79
web.nvd.nist.gov
26
phlex
open source
ruby
framework
xss
vulnerability
exploit
user data
filter bypass
href attribute
fix
versions
content security policy

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%

phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the javascript: URL scheme in the href attribute of an <a> tag could be bypassed with tab \t or newline \n characters between the characters of the protocol, e.g. java\tscript:. This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow unsafe-inline would effectively prevent this vulnerability from being exploited.

Affected configurations

Vulners
Node
phlex-rubyphlexRange1.10.01.10.1
OR
phlex-rubyphlexRange1.9.01.9.2
OR
phlex-rubyphlexRange1.8.01.8.3
OR
phlex-rubyphlexRange1.7.01.7.2
OR
phlex-rubyphlexRange1.6.01.6.3
OR
phlex-rubyphlexRange1.5.01.5.3
OR
phlex-rubyphlexRange1.4.01.4.2

CNA Affected

[
  {
    "vendor": "phlex-ruby",
    "product": "phlex",
    "versions": [
      {
        "version": ">= 1.10.0, < 1.10.1",
        "status": "affected"
      },
      {
        "version": ">= 1.9.0, < 1.9.2",
        "status": "affected"
      },
      {
        "version": ">= 1.8.0, < 1.8.3",
        "status": "affected"
      },
      {
        "version": ">= 1.7.0, < 1.7.2",
        "status": "affected"
      },
      {
        "version": ">= 1.6.0, < 1.6.3",
        "status": "affected"
      },
      {
        "version": ">= 1.5.0, < 1.5.3",
        "status": "affected"
      },
      {
        "version": ">= 1.4.0, < 1.4.2",
        "status": "affected"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.8%

Related for CVE-2024-32463