CVE-2022-3704

A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.
References
Link Resource
https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4 Patch Third Party Advisory
https://github.com/rails/rails/issues/46244 Exploit Issue Tracking Patch Third Party Advisory
https://vuldb.com/?id.212319 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubyonrails:rails:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:51

Type Values Removed Values Added
CWE CWE-74
CWE-79
Summary ** DISPUTED ** A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team. A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.

19 Jan 2023, 23:15

Type Values Removed Values Added
CWE CWE-74
CWE-707
Summary A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. ** DISPUTED ** A vulnerability classified as problematic has been found in Ruby on Rails. This affects an unknown part of the file actionpack/lib/action_dispatch/middleware/templates/routes/_table.html.erb. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The real existence of this vulnerability is still doubted at the moment. The name of the patch is be177e4566747b73ff63fd5f529fab564e475ed4. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-212319. NOTE: Maintainer declares that there isn’t a valid attack vector. The issue was wrongly reported as a security vulnerability by a non-member of the Rails team.

28 Oct 2022, 17:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:a:rubyonrails:rails:-:*:*:*:*:*:*:*
CWE CWE-79
First Time Rubyonrails rails
Rubyonrails
References (MISC) https://github.com/rails/rails/issues/46244 - (MISC) https://github.com/rails/rails/issues/46244 - Exploit, Issue Tracking, Patch, Third Party Advisory
References (MISC) https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4 - (MISC) https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4 - Patch, Third Party Advisory
References (MISC) https://vuldb.com/?id.212319 - (MISC) https://vuldb.com/?id.212319 - Permissions Required, Third Party Advisory

26 Oct 2022, 22:54

Type Values Removed Values Added
New CVE

Information

Published : 2022-10-26 20:15

Updated : 2024-04-11 01:16


NVD link : CVE-2022-3704

Mitre link : CVE-2022-3704

CVE.ORG link : CVE-2022-3704


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-707

Improper Neutralization

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')