First published: Wed Jan 06 2021(Updated: )
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=6.0.0<=6.0.3.3 | 6.0.3.4 |
Rubyonrails Rails | >=6.0.0<6.0.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8264 is medium with a CVSS score of 6.1.
CVE-2020-8264 affects the actionpack gem versions 6.0.0 to 6.0.3.3, allowing a possible XSS vulnerability in development mode.
An attacker can exploit CVE-2020-8264 by sending or embedding a specially crafted URL in another page, allowing them to execute JavaScript in the context of the local application.
To remediate CVE-2020-8264, it is recommended to upgrade the actionpack gem to version 6.0.3.4 or higher.
Yes, Rubyonrails Rails versions 6.0.0 to 6.0.3.3 are also affected by CVE-2020-8264.