Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32463
HistoryApr 17, 2024 - 3:29 p.m.

CVE-2024-32463 phlex makes Cross-site Scripting (XSS) possible due to improper sanitisation of `href` attributes on `<a>` tags

2024-04-1715:29:14
CWE-79
GitHub_M
www.cve.org
phlex
xss
vulnerability
ruby
framework
sanitisation
href
attribute
bypass
content security policy

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

0.0004 Low

EPSS

Percentile

15.5%

phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the javascript: URL scheme in the href attribute of an <a> tag could be bypassed with tab \t or newline \n characters between the characters of the protocol, e.g. java\tscript:. This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow unsafe-inline would effectively prevent this vulnerability from being exploited.

CNA Affected

[
  {
    "vendor": "phlex-ruby",
    "product": "phlex",
    "versions": [
      {
        "version": ">= 1.10.0, < 1.10.1",
        "status": "affected"
      },
      {
        "version": ">= 1.9.0, < 1.9.2",
        "status": "affected"
      },
      {
        "version": ">= 1.8.0, < 1.8.3",
        "status": "affected"
      },
      {
        "version": ">= 1.7.0, < 1.7.2",
        "status": "affected"
      },
      {
        "version": ">= 1.6.0, < 1.6.3",
        "status": "affected"
      },
      {
        "version": ">= 1.5.0, < 1.5.3",
        "status": "affected"
      },
      {
        "version": ">= 1.4.0, < 1.4.2",
        "status": "affected"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

0.0004 Low

EPSS

Percentile

15.5%

Related for CVELIST:CVE-2024-32463