CVE-2015-7579
Summary
| CVE | CVE-2015-7579 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-02-16 02:59:00 UTC |
| Updated | 2019-08-08 15:16:00 UTC |
| Description | Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rubyonrails | Html Sanitizer | All | All | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta3 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta4 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.2.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.3 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.4 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.5.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.5.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta1.1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta3 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta3 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | beta4 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.0 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.2.1 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.2.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.3 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.4 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.2.5 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.2.5.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.5.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.2.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta1.1 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 5.0.0 | beta3 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [ruby-security-ann] 20160125 [CVE-2015-7579] XSS vulnerability in rails-html-sanitizer | MLIST | groups.google.com | |
| Do not unescape already escaped HTML entities · rails/rails-html-sanitizer@49dfc15 · GitHub | CONFIRM | github.com | |
| [security-announce] openSUSE-SU-2016:0356-1: important: Security update | SUSE | lists.opensuse.org | |
| Rails Multiple Bugs Let Remote Users Determine Passwords, Modify Records, Bypass Security Restrictions, Deny Service, and Conduct Cross-Site Scripting Attacks - SecurityTracker | SECTRACK | www.securitytracker.com | |
| [security-announce] SUSE-SU-2016:1146-1: important: Security update for | SUSE | lists.opensuse.org | |
| [SECURITY] Fedora 22 Update: rubygem-rails-html-sanitizer-1.0.1-2.fc22 | FEDORA | lists.fedoraproject.org | |
| [SECURITY] Fedora 23 Update: rubygem-rails-html-sanitizer-1.0.3-1.fc23 | FEDORA | lists.fedoraproject.org | |
| [security-announce] SUSE-SU-2016:0391-1: important: Security update for | SUSE | lists.opensuse.org | |
| oss-security - [CVE-2015-7579] XSS vulnerability in rails-html-sanitizer | MLIST | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.