First published: Thu May 31 2018(Updated: )
It was found that Sinatra is vulnerable to an XSS via the 400 Bad Request page that occurs upon a params parser exception. Upstream issue: <a href="https://github.com/sinatra/sinatra/issues/1428">https://github.com/sinatra/sinatra/issues/1428</a> Introduced by: <a href="https://github.com/sinatra/sinatra/commit/8f8df53ff29938ace79b31097c27d9cdac803b44">https://github.com/sinatra/sinatra/commit/8f8df53ff29938ace79b31097c27d9cdac803b44</a> Upstream patch: <a href="https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a">https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/sinatra | >=2.0.0<2.0.2 | 2.0.2 |
Sinatrarb Sinatra | <2.0.2 | |
Redhat Cloudforms | =4.6 | |
Redhat Cloudforms | =4.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-11627 is medium.
An attacker can exploit CVE-2018-11627 by injecting malicious code through a specially crafted request, leading to cross-site scripting (XSS) attacks.
The affected software of CVE-2018-11627 includes Sinatra versions before 2.0.2, Redhat Cloudforms versions 4.6 and 4.7.
To remediate CVE-2018-11627, upgrade to Sinatra version 2.0.2 or later.
You can find more information about CVE-2018-11627 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2018-11627), [GitHub Issue](https://github.com/sinatra/sinatra/issues/1428), [GitHub Commit](https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a).