First published: Wed Aug 07 2019(Updated: )
It was discovered that Rack incorrectly handled carefully crafted requests. A remote attacker could use this issue to execute a cross-site scripting (XSS) attack.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ruby-rack | <1.6.4-4ubuntu0.1 | 1.6.4-4ubuntu0.1 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/ruby-rack | <1.6.4-3ubuntu0.1 | 1.6.4-3ubuntu0.1 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4089-1 is classified as critical due to the potential for cross-site scripting (XSS) attacks.
To fix USN-4089-1, upgrade the ruby-rack package to version 1.6.4-4ubuntu0.1 or 1.6.4-3ubuntu0.1 depending on your Ubuntu version.
USN-4089-1 affects ruby-rack versions prior to 1.6.4-4ubuntu0.1 for Ubuntu 18.04 and versions prior to 1.6.4-3ubuntu0.1 for Ubuntu 16.04.
Yes, USN-4089-1 can be exploited remotely by attackers through specially crafted requests.
USN-4089-1 addresses a cross-site scripting (XSS) vulnerability in the Rack library.