[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-16471Date: (C)2019-06-19   (M)2023-12-22


There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.1CVSS Score : 4.3
Exploit Score: 2.8Exploit Score: 8.6
Impact Score: 2.7Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: NONE
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: NONE
Integrity: LOW 
Availability: NONE 
  
Reference:
USN-4089-1
https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html
https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag
openSUSE-SU-2019:1553
openSUSE-SU-2020:0214

CPE    1
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-79
OVAL    5
oval:org.secpod.oval:def:115560
oval:org.secpod.oval:def:115547
oval:org.secpod.oval:def:58359
oval:org.secpod.oval:def:705107
...

© SecPod Technologies