CVE-2013-0256

Published Mar 1, 2013

Last updated 3 years ago

Overview

Description
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
Source
secalert@redhat.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
4.3
Impact score
2.9
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:N/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-79

Evaluator

Comment
-
Impact
Per http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/ Affected versions All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 383 All ruby 2.0 versions prior to ruby 2.0.0 rc2 or prior to trunk revision 39102
Solution
Per http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/ Affected versions All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 383 All ruby 2.0 versions prior to ruby 2.0.0 rc2 or prior to trunk revision 39102

Configurations