First published: Tue Feb 05 2013(Updated: )
A cross-site scripting (XSS) flaw was found in the way Darkfish Rdoc HTML generator / template of RDoc, HTML and command-line documentation producing tool for Ruby, performed sanitization of certain values when creating Rdoc documentation. When Ruby on Rails application exposed its documentation via network, a remote attacker could provide a specially-crafted URL that, when opened would lead to arbitrary web script or HTML code execution in the context of (particular Ruby on Rails application) user's session. This issue affects RDoc versions 2.3.0 to 3.12.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/RDoc | <3.9.5 | 3.9.5 |
redhat/RDoc | <3.12.1 | 3.12.1 |
redhat/RDoc | <4.0.0. | 4.0.0. |
Ruby RDoc | >=2.3.0<3.12 | |
Ruby RDoc | =4.0.0-preview2 | |
Ruby | =1.9 | |
Ruby | =1.9.1 | |
Ruby | =1.9.2 | |
Ruby | =1.9.3 | |
Ruby | =1.9.3-p0 | |
Ruby | =1.9.3-p125 | |
Ruby | =1.9.3-p194 | |
Ruby | =1.9.3-p286 | |
Ruby | =1.9.3-p383 | |
Ruby | =2.0 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-rc1 | |
Ruby | =2.0.0-rc2 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0256 has been assigned a medium severity level due to potential cross-site scripting vulnerabilities.
To fix CVE-2013-0256, update RDoc to version 3.9.6 or higher, or any version above 4.0.0.
CVE-2013-0256 affects RDoc versions up to 3.9.5, 3.12.1, and 4.0.0-preview2, as well as several Ruby versions.
CVE-2013-0256 exploits a cross-site scripting flaw in the sanitization process during RDoc documentation generation.
Yes, if your Ruby on Rails application exposes its RDoc documentation without proper sanitization, it can be vulnerable to CVE-2013-0256.