First published: Wed Apr 27 2022(Updated: )
A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Actionpack | <5.2.7.1 | |
Rubyonrails Actionpack | >=6.0.0<6.0.4.8 | |
Rubyonrails Actionpack | >=6.1.0<6.1.5.1 | |
Rubyonrails Actionpack | >=7.0.0<7.0.2.4 | |
Debian Debian Linux | =10.0 | |
redhat/rubygem-actionview | <0:6.1.7-1.el8 | 0:6.1.7-1.el8 |
debian/rails | <=2:5.2.2.1+dfsg-1+deb10u3 | 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27777 is a Cross-site scripting (XSS) vulnerability in Action View tag helpers.
CVE-2022-27777 occurs when untrusted data, like the hash key for tag attributes, are not properly escaped, allowing an attacker to execute a XSS attack.
The severity of CVE-2022-27777 is high with a CVSS score of 7.5.
rubygem-actionview versions >= 5.2.0 and < 7.0.2.4 are affected by CVE-2022-27777.
To fix CVE-2022-27777, update rubygem-actionview to version 7.0.2.4 or higher.