Lucene search

K
rubygemsRubySecRUBY:TEXT_HELPERS-2020-36624
HistoryDec 21, 2022 - 9:00 p.m.

text_helpers uses web link to untrusted target with window.opener access

2022-12-2121:00:00
RubySec
github.com
10
vulnerability
ahorner text-helpers
version 1.2.0

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. It has
been declared as critical. This vulnerability affects unknown code of the file
lib/text_helpers/translation.rb. The manipulation of the argument link leads to
use of web link to untrusted target with window.opener access. The attack can be
initiated remotely. Upgrading to version 1.2.0 can address this issue. The name
of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to
upgrade the affected component. The identifier of this vulnerability is VDB-216520.

Affected configurations

Vulners
Node
rubytext_helpersRange1.2.0
VendorProductVersionCPE
rubytext_helpers*cpe:2.3:a:ruby:text_helpers:*:*:*:*:*:*:*:*

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Related for RUBY:TEXT_HELPERS-2020-36624