First published: Sun Jul 26 2015(Updated: )
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/jquery-ujs | <1.0.4 | 1.0.4 |
rubygems/jquery-rails | >=4.0.0<4.0.4 | 4.0.4 |
rubygems/jquery-rails | <3.1.3 | 3.1.3 |
Fedoraproject Fedora | =21 | |
Fedoraproject Fedora | =22 | |
Rubyonrails Jquery-rails | <=3.1.2 | |
Rubyonrails Jquery-rails | =4.0.0 | |
Rubyonrails Jquery-rails | =4.0.1 | |
Rubyonrails Jquery-ujs | <=1.0.3 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.