There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1585-1 | ruby-rack security update |
EUVD |
EUVD-2018-0731 | There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable. |
Github GHSA |
GHSA-5r2p-j47h-mhpg | Rack vulnerable to Cross-site Scripting |
Ubuntu USN |
USN-4089-1 | Rack vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-05T10:24:32.587Z
Reserved: 2018-09-04T00:00:00
Link: CVE-2018-16471
No data.
Status : Modified
Published: 2018-11-13T23:29:00.310
Modified: 2024-11-21T03:52:49.253
Link: CVE-2018-16471
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN