First published: Tue Feb 05 2013(Updated: )
A cross-site scripting (XSS) flaw was found in the way Darkfish Rdoc HTML generator / template of RDoc, HTML and command-line documentation producing tool for Ruby, performed sanitization of certain values when creating Rdoc documentation. When Ruby on Rails application exposed its documentation via network, a remote attacker could provide a specially-crafted URL that, when opened would lead to arbitrary web script or HTML code execution in the context of (particular Ruby on Rails application) user's session. This issue affects RDoc versions 2.3.0 to 3.12.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/RDoc | <3.9.5 | 3.9.5 |
redhat/RDoc | <3.12.1 | 3.12.1 |
redhat/RDoc | <4.0.0. | 4.0.0. |
Ruby-lang Rdoc | >=2.3.0<3.12 | |
Ruby-lang Rdoc | =4.0.0-preview2 | |
Ruby-lang Ruby | =1.9 | |
Ruby-lang Ruby | =1.9.1 | |
Ruby-lang Ruby | =1.9.2 | |
Ruby-lang Ruby | =1.9.3 | |
Ruby-lang Ruby | =1.9.3-p0 | |
Ruby-lang Ruby | =1.9.3-p125 | |
Ruby-lang Ruby | =1.9.3-p194 | |
Ruby-lang Ruby | =1.9.3-p286 | |
Ruby-lang Ruby | =1.9.3-p383 | |
Ruby-lang Ruby | =2.0 | |
Ruby-lang Ruby | =2.0.0 | |
Ruby-lang Ruby | =2.0.0-rc1 | |
Ruby-lang Ruby | =2.0.0-rc2 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.