Lucene search

K
rubygemsRubySecRUBY:EMBER-SOURCE-2014-0013
HistoryJan 13, 2014 - 8:00 p.m.

Ember.js Potential XSS Exploit With User-Supplied Data When Binding Primitive Values

2014-01-1320:00:00
RubySec
groups.google.com
8

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

In general, Ember.js escapes or strips any user-supplied content before
inserting it in strings that will be sent to innerHTML. However, we have
identified a vulnerability that could lead to unescaped content being inserted
into the innerHTML string without being sanitized.

When a primitive value is used as the Handlebars context, that value is not
properly escaped. An example of this would be using the {{each}} helper to
iterate over an array of user-supplied strings and using {{this}} inside the
block to display each string.

In applications that contain templates whose context is a primitive value and
use the {{this}} keyword to display that value, a specially-crafted payload
could execute arbitrary JavaScript in the context of the current domain
(“XSS”).

This vulnerability affects applications that contain templates whose context is
set to a user-supplied primitive value (such as a string or number) and also
contain the {{this}} special Handlebars variable to display the value.

Affected configurations

Vulners
Node
rubyember-sourceRange1.0.01.0.1
OR
rubyember-sourceRange1.1.01.1.3
OR
rubyember-sourceRange1.2.01.2.1
OR
rubyember-sourceRange1.3.01.3.1
OR
rubyember-sourceRange1.4.0.2
VendorProductVersionCPE
rubyember-source*cpe:2.3:a:ruby:ember-source:*:*:*:*:*:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Related for RUBY:EMBER-SOURCE-2014-0013