[ASA-201910-4] ruby-rdoc: cross-site scripting
Levente Polyak
anthraxx at archlinux.org
Thu Oct 3 19:16:44 UTC 2019
Arch Linux Security Advisory ASA-201910-4
=========================================
Severity: Medium
Date : 2019-10-02
CVE-ID : CVE-2012-6708 CVE-2015-9251
Package : ruby-rdoc
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1041
Summary
=======
The package ruby-rdoc before version 6.1.2-1 is vulnerable to cross-
site scripting.
Resolution
==========
Upgrade to 6.1.2-1.
# pacman -Syu "ruby-rdoc>=6.1.2-1"
The problems have been fixed upstream in version 6.1.2.
Workaround
==========
None.
Description
===========
- CVE-2012-6708 (cross-site scripting)
jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
attacks. The jQuery(strInput) function does not differentiate selectors
from HTML in a reliable fashion. In vulnerable versions, jQuery
determined whether the input was HTML by looking for the '<' character
anywhere in the string, giving attackers more flexibility when
attempting to construct a malicious payload. In fixed versions, jQuery
only deems the input to be HTML if it explicitly starts with the '<'
character, limiting exploitability only to attackers who can control
the beginning of a string, which is far less common.
- CVE-2015-9251 (cross-site scripting)
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks
when a cross-domain Ajax request is performed without the dataType
option, causing text/javascript responses to be executed.
Impact
======
An attacker is able to perform cross-side scripting attacks by tricking
users to generate documentation with a vulnerable RDoc version. RDoc is
a static documentation generation tool, patching the tool itself is
insufficient to mitigate these vulnerabilities. Documentations
generated with previous versions have to be re-generated with newer
RDoc.
References
==========
https://bugs.archlinux.org/task/63978
https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
https://bugs.jquery.com/ticket/11290
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
https://github.com/jquery/jquery/issues/2432
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
https://security.archlinux.org/CVE-2012-6708
https://security.archlinux.org/CVE-2015-9251
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20191003/0d6df8bc/attachment.sig>
More information about the arch-security
mailing list