Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-50725
HistoryDec 22, 2023 - 8:02 p.m.

CVE-2023-50725 Resque vulnerable to reflected XSS in resque-web failed and queues lists

2023-12-2220:02:15
CWE-79
GitHub_M
www.cve.org
1
resque
redis
ruby
background jobs
reflected xss
resque-web
queues
failed
patch

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

20.4%

Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: “/failed/?class=<script>alert(document.cookie)</script>” and “/queues/><img src>”. This issue has been patched in version 2.2.1.

CNA Affected

[
  {
    "vendor": "resque",
    "product": "resque",
    "versions": [
      {
        "version": "< 2.2.1",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

0.001 Low

EPSS

Percentile

20.4%

Related for CVELIST:CVE-2023-50725