[ASA-201910-4] ruby-rdoc: cross-site scripting
anthraxx at archlinux.org
Thu Oct 3 19:16:44 UTC 2019
Arch Linux Security Advisory ASA-201910-4
Date : 2019-10-02
CVE-ID : CVE-2012-6708 CVE-2015-9251
Package : ruby-rdoc
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1041
The package ruby-rdoc before version 6.1.2-1 is vulnerable to cross-
Upgrade to 6.1.2-1.
# pacman -Syu "ruby-rdoc>=6.1.2-1"
The problems have been fixed upstream in version 6.1.2.
- CVE-2012-6708 (cross-site scripting)
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
attacks. The jQuery(strInput) function does not differentiate selectors
from HTML in a reliable fashion. In vulnerable versions, jQuery
determined whether the input was HTML by looking for the '<' character
anywhere in the string, giving attackers more flexibility when
attempting to construct a malicious payload. In fixed versions, jQuery
only deems the input to be HTML if it explicitly starts with the '<'
character, limiting exploitability only to attackers who can control
the beginning of a string, which is far less common.
- CVE-2015-9251 (cross-site scripting)
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks
when a cross-domain Ajax request is performed without the dataType
An attacker is able to perform cross-side scripting attacks by tricking
users to generate documentation with a vulnerable RDoc version. RDoc is
a static documentation generation tool, patching the tool itself is
insufficient to mitigate these vulnerabilities. Documentations
generated with previous versions have to be re-generated with newer
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security