An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim’s browser. An attacker can phish an authenticated user to trigger this vulnerability.
CPE | Name | Operator | Version |
---|---|---|---|
rails_admin | eq | 0.4.7 | |
rails_admin | eq | 0.1.1 | |
rails_admin | eq | 0.5.0 | |
rails_admin | eq | 0.0.5 | |
rails_admin | eq | 0.4.2 | |
rails_admin | eq | 0.4.1 | |
rails_admin | eq | 0.2.0 | |
rails_admin | eq | 0.8.1 | |
rails_admin | eq | 1.2.0 | |
rails_admin | eq | 1.1.1 |
github.com/advisories/GHSA-pxr8-w3jq-rcwj
github.com/railsadminteam/rails_admin
github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2017-12098.yml
nvd.nist.gov/vuln/detail/CVE-2017-12098
web.archive.org/web/20210116160904/www.securityfocus.com/bid/102486
www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450