First published: Sun Jul 26 2015(Updated: )
Cross-site scripting (XSS) vulnerability in `json/encoding.rb` in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =3.0.0 | |
Rubyonrails Rails | =3.1.0 | |
Rubyonrails Rails | =3.2.0 | |
Rubyonrails Rails | =3.2.1 | |
Rubyonrails Rails | =3.2.2 | |
Rubyonrails Rails | =3.2.3 | |
Rubyonrails Rails | =3.2.4 | |
Rubyonrails Rails | =3.2.5 | |
Rubyonrails Rails | =3.2.6 | |
Rubyonrails Rails | =3.2.7 | |
Rubyonrails Rails | =3.2.8 | |
Rubyonrails Rails | =3.2.9 | |
Rubyonrails Rails | =3.2.10 | |
Rubyonrails Rails | =3.2.11 | |
Rubyonrails Rails | =3.2.12 | |
Rubyonrails Rails | =3.2.13 | |
Rubyonrails Rails | =3.2.15 | |
Rubyonrails Rails | =3.2.16 | |
Rubyonrails Rails | =3.2.17 | |
Rubyonrails Rails | =4.1.0 | |
Rubyonrails Rails | =4.1.1 | |
Rubyonrails Rails | =4.1.2 | |
Rubyonrails Rails | =4.1.3 | |
Rubyonrails Rails | =4.1.4 | |
Rubyonrails Rails | =4.1.5 | |
Rubyonrails Rails | =4.1.6 | |
Rubyonrails Rails | =4.1.7 | |
Rubyonrails Rails | =4.1.8 | |
Rubyonrails Rails | =4.2.0 | |
Rubyonrails Rails | =4.2.1 | |
Rubyonrails Ruby On Rails | =3.2.14 | |
rubygems/activesupport | >=3.0.0<=3.2.22.4 | 3.2.22.5 |
rubygems/activesupport | >=4.2.0<4.2.2 | 4.2.2 |
rubygems/activesupport | >=4.1.0<4.1.11 | 4.1.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.