First published: Tue Nov 13 2018(Updated: )
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rack Project Rack | >=1.6.0<1.6.11 | |
Rack Project Rack | >=2.0.0<2.0.6 | |
Debian Debian Linux | =8.0 | |
rubygems/rack | <1.6.11 | 1.6.11 |
rubygems/rack | >=2.0.0<2.0.6 | 2.0.6 |
ubuntu/ruby-rack | <1.6.4-4ubuntu0.1 | 1.6.4-4ubuntu0.1 |
ubuntu/ruby-rack | <1.5.2-3+ | 1.5.2-3+ |
ubuntu/ruby-rack | <1.5.2-3+<1.6.4-4+<1.6.11<2.0.6 | 1.5.2-3+ 1.6.4-4+ 1.6.11 2.0.6 |
ubuntu/ruby-rack | <1.6.4-3ubuntu0.1 | 1.6.4-3ubuntu0.1 |
debian/ruby-rack | 2.1.4-3+deb11u2 2.2.6.4-1+deb12u1 2.2.7-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-16471.
The severity of CVE-2018-16471 is medium with a severity value of 6.1.
CVE-2018-16471 affects Rack versions before 2.0.6 and 1.6.11.
CVE-2018-16471 allows carefully crafted requests to impact the data returned by the `scheme` method on `Rack::Request`, potentially leading to XSS vulnerabilities.
To fix CVE-2018-16471, update Rack to version 2.0.6 or 1.6.11 or later.