Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-32464
HistoryJun 04, 2024 - 7:53 p.m.

CVE-2024-32464 ActionText ContentAttachment can Contain Unsanitized HTML

2024-06-0419:53:59
CWE-80
CWE-79
GitHub_M
www.cve.org
2
cve-2024-32464
actiontext
contentattachment
html
rails
vulnerability

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2.

CNA Affected

[
  {
    "vendor": "rails",
    "product": "rails",
    "versions": [
      {
        "version": ">= 7.1.0, < 7.1.3.4",
        "status": "affected"
      },
      {
        "version": "= 7.2.0.beta1",
        "status": "affected"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%