Lucene search

K
rubygemsRubySecRUBY:GOLLUM-2020-35305
HistoryJul 15, 2022 - 9:00 p.m.

XSS via `filename` parameter to New Page dialog

2022-07-1521:00:00
RubySec
github.com
3
xss
gollum
5.0-5.1.2
filename parameter
new page dialog

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Cross site scripting (XSS) in gollum 5.0 to 5.1.2 via the filename parameter
to the ‘New Page’ dialog.

Affected configurations

Vulners
Node
rubygollumRange5.1.2
VendorProductVersionCPE
rubygollum*cpe:2.3:a:ruby:gollum:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Related for RUBY:GOLLUM-2020-35305