CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
10.3%
There is a possible XSS vulnerability when using the translation helpers
(translate
, t
, etc) in Action Controller. This vulnerability has been
assigned the CVE identifier CVE-2024-26143.
Versions Affected: >= 7.0.0.
Not affected: < 7.0.0
Fixed Versions: 7.1.3.1, 7.0.8.1
Applications using translation methods like translate
, or t
on a
controller, with a key ending in “_html”, a :default
key which contains
untrusted user input, and the resulting string is used in a view, may be
susceptible to an XSS vulnerability.
For example, impacted code will look something like this:
class ArticlesController < ApplicationController
def show
@message = t("message_html", default: untrusted_input)
# The `show` template displays the contents of `@message`
end
end
To reiterate the pre-conditions, applications must:
t
from_html
render
call)All users running an affected release should either upgrade or use one of the
workarounds immediately.
The fixed releases are available at the normal locations.
There are no feasible workarounds for this issue.
To aid users who aren’t able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
Thanks to ooooooo_q for the patch and fix!
Vendor | Product | Version | CPE |
---|---|---|---|
rails | rails | * | cpe:2.3:a:rails:rails:*:*:*:*:*:*:*:* |
actionpack_project | actionpack | * | cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:* |
discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947
github.com/advisories/GHSA-9822-6m93-xqf4
github.com/rails/rails/commit/4c83b331092a79d58e4adffe4be5f250fa5782cc
github.com/rails/rails/commit/5187a9ef51980ad1b8e81945ebe0462d28f84f9e
github.com/rails/rails/security/advisories/GHSA-9822-6m93-xqf4
github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26143.yml
nvd.nist.gov/vuln/detail/CVE-2024-26143
security.netapp.com/advisory/ntap-20240510-0004
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
10.3%