First published: Wed Aug 17 2011(Updated: )
An XSS vulnerability in the escaping code used by Ruby on Rails was reported [1] where, using a specially crafted malformed unicode string, an attacker can bypass the escaping code. Due to a bug in the Ruby 1.8 regular expression code, the Ruby on Rails replacement for ERB::Util.h will fail to escape certain malformed unicode strings, which could then be interpreted as HTML by some browsers. This is corrected in upstream 3.0.10, 2.3.13, and 3.1.0rc5 versions and only affects platforms using Ruby 1.8.x (Ruby 1.9.x renders this ineffective). Patches are available in the advisory [1] and in git [2]. [1] <a href="http://groups.google.com/group/rubyonrails-security/browse_thread/thread/56bffb5923ab1195">http://groups.google.com/group/rubyonrails-security/browse_thread/thread/56bffb5923ab1195</a> [2] <a href="https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd">https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activesupport | >=3.0.0<3.0.10 | 3.0.10 |
rubygems/activesupport | >=2.0.0<2.3.13 | 2.3.13 |
redhat/rubygem-activesupport | <2.3.13 | 2.3.13 |
redhat/rubygem-activesupport | <3.0.10 | 3.0.10 |
redhat/rubygem-activesupport | <3.1.0 | 3.1.0 |
rubyonrails Rails | =2.0.0 | |
rubyonrails Rails | =2.0.0-rc1 | |
rubyonrails Rails | =2.0.0-rc2 | |
rubyonrails Rails | =2.0.1 | |
rubyonrails Rails | =2.0.2 | |
rubyonrails Rails | =2.0.4 | |
rubyonrails Rails | =2.1.0 | |
rubyonrails Rails | =2.1.1 | |
rubyonrails Rails | =2.1.2 | |
rubyonrails Rails | =2.2.0 | |
rubyonrails Rails | =2.2.1 | |
rubyonrails Rails | =2.2.2 | |
rubyonrails Rails | =2.3.2 | |
rubyonrails Rails | =2.3.3 | |
rubyonrails Rails | =2.3.4 | |
rubyonrails Rails | =2.3.9 | |
rubyonrails Rails | =2.3.10 | |
rubyonrails Rails | =2.3.11 | |
rubyonrails Rails | =2.3.12 | |
rubyonrails Rails | =3.0.0 | |
rubyonrails Rails | =3.0.0-beta | |
rubyonrails Rails | =3.0.0-beta2 | |
rubyonrails Rails | =3.0.0-beta3 | |
rubyonrails Rails | =3.0.0-beta4 | |
rubyonrails Rails | =3.0.0-rc | |
rubyonrails Rails | =3.0.0-rc2 | |
rubyonrails Rails | =3.0.1 | |
rubyonrails Rails | =3.0.1-pre | |
rubyonrails Rails | =3.0.2 | |
rubyonrails Rails | =3.0.2-pre | |
rubyonrails Rails | =3.0.3 | |
rubyonrails Rails | =3.0.4-rc1 | |
rubyonrails Rails | =3.0.5 | |
rubyonrails Rails | =3.0.5-rc1 | |
rubyonrails Rails | =3.0.6 | |
rubyonrails Rails | =3.0.6-rc1 | |
rubyonrails Rails | =3.0.6-rc2 | |
rubyonrails Rails | =3.0.7 | |
rubyonrails Rails | =3.0.7-rc1 | |
rubyonrails Rails | =3.0.7-rc2 | |
rubyonrails Rails | =3.0.8 | |
rubyonrails Rails | =3.0.8-rc1 | |
rubyonrails Rails | =3.0.8-rc2 | |
rubyonrails Rails | =3.0.8-rc3 | |
rubyonrails Rails | =3.0.8-rc4 | |
rubyonrails Rails | =3.0.9 | |
rubyonrails Rails | =3.0.9-rc1 | |
rubyonrails Rails | =3.0.9-rc2 | |
rubyonrails Rails | =3.0.9-rc3 | |
rubyonrails Rails | =3.0.9-rc4 | |
rubyonrails Rails | =3.0.9-rc5 | |
rubyonrails Rails | =3.0.10-rc1 | |
rubyonrails Rails | =3.1.0 | |
rubyonrails Rails | =3.1.0-beta1 | |
rubyonrails Rails | =3.1.0-rc1 | |
rubyonrails Rails | =3.1.0-rc2 | |
rubyonrails Rails | =3.1.0-rc3 | |
rubyonrails Rails | =3.1.0-rc4 | |
Ruby on Rails | =3.0.4 |
http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2932 has a medium severity level due to its potential for cross-site scripting exploitation.
To fix CVE-2011-2932, upgrade to activesupport versions 3.0.10 or 2.3.13 or later.
CVE-2011-2932 affects Ruby on Rails versions prior to 3.0.10 and 2.3.13.
Yes, CVE-2011-2932 can allow attackers to execute malicious scripts, potentially leading to data breaches.
CVE-2011-2932 can facilitate cross-site scripting (XSS) attacks against vulnerable applications.