First published: Wed Sep 23 2020(Updated: )
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/gon | <6.4.0 | 6.4.0 |
debian/ruby-gon | 6.4.0-1 6.4.0-2 | |
ubuntu/ruby-gon | <6.1.0-1+ | 6.1.0-1+ |
gon project gon Ruby | <6.4.0 | |
Ubuntu Linux | =18.04 | |
Debian GNU/Linux | =9.0 | |
Gon Project Gon | <6.4.0 | |
Ubuntu | =18.04 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25739 is classified as a medium severity vulnerability due to its potential for XSS attacks.
To fix CVE-2020-25739, upgrade the gon gem to version 6.4.0 or later.
Versions of the gon gem prior to 6.4.0 are affected by CVE-2020-25739.
Yes, versions of ruby-gon prior to 6.4.0-1 and 6.4.0-2 are vulnerable to CVE-2020-25739.
CVE-2020-25739 affects systems using the gon gem in Ruby applications, including Debian and Ubuntu installations.