[ASA-201910-4] ruby-rdoc: cross-site scripting

Levente Polyak anthraxx at archlinux.org
Thu Oct 3 19:16:44 UTC 2019


Arch Linux Security Advisory ASA-201910-4
=========================================

Severity: Medium
Date    : 2019-10-02
CVE-ID  : CVE-2012-6708 CVE-2015-9251
Package : ruby-rdoc
Type    : cross-site scripting
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1041

Summary
=======

The package ruby-rdoc before version 6.1.2-1 is vulnerable to cross-
site scripting.

Resolution
==========

Upgrade to 6.1.2-1.

# pacman -Syu "ruby-rdoc>=6.1.2-1"

The problems have been fixed upstream in version 6.1.2.

Workaround
==========

None.

Description
===========

- CVE-2012-6708 (cross-site scripting)

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
attacks. The jQuery(strInput) function does not differentiate selectors
from HTML in a reliable fashion. In vulnerable versions, jQuery
determined whether the input was HTML by looking for the '<' character
anywhere in the string, giving attackers more flexibility when
attempting to construct a malicious payload. In fixed versions, jQuery
only deems the input to be HTML if it explicitly starts with the '<'
character, limiting exploitability only to attackers who can control
the beginning of a string, which is far less common.

- CVE-2015-9251 (cross-site scripting)

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks
when a cross-domain Ajax request is performed without the dataType
option, causing text/javascript responses to be executed.

Impact
======

An attacker is able to perform cross-side scripting attacks by tricking
users to generate documentation with a vulnerable RDoc version. RDoc is
a static documentation generation tool, patching the tool itself is
insufficient to mitigate these vulnerabilities. Documentations
generated with previous versions have to be re-generated with newer
RDoc.

References
==========

https://bugs.archlinux.org/task/63978
https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
https://bugs.jquery.com/ticket/11290
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
https://github.com/jquery/jquery/issues/2432
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
https://security.archlinux.org/CVE-2012-6708
https://security.archlinux.org/CVE-2015-9251

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20191003/0d6df8bc/attachment.sig>


More information about the arch-security mailing list