Lucene search

K
rubygemsRubySecRUBY:RAILS_ADMIN-2024-39308
HistoryJul 07, 2024 - 9:00 p.m.

RailsAdmin Cross-site Scripting vulnerability in the list view

2024-07-0721:00:00
RubySec
github.com
7
railsadmin
xss
vulnerability
list view
patch
workaround
upgrade
ruby on rails
security advisory

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High

Impact

RailsAdmin list view has the XSS vulnerability, caused by
improperly-escaped HTML title attribute. The issue was originally
reported in https://github.com/railsadminteam/rails_admin/issues/3686.

Patches

Upgrade to 3.1.3
or 2.3.0.

Workarounds

  1. Copy the index view (located under the path
    app/views/rails_admin/main/index.html.erb) from the RailsAdmin
    version you use, and place it into your application by using
    the same path.

  2. Open the view file by an editor, and remove strip_tags from
    the title attribute (as shown in GHSA advisory below).

Note: The view file created by this needs to be removed after
upgrading RailsAdmin afterwards, unless this old view continue to
be used. Only do this if you can’t upgrade RailsAdmin now for a reason.

References

https://owasp.org/www-community/attacks/xss/
https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-strip_tags

Affected configurations

Vulners
Node
rubyrails_adminRange2.3.02.3.0
OR
rubyrails_adminRange3.1.3
VendorProductVersionCPE
rubyrails_admin*cpe:2.3:a:ruby:rails_admin:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.9

Confidence

High