CVE-2013-0256
Published Mar 1, 2013
Last updated 3 years ago
Overview
- Description
- darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Evaluator
- Comment
- -
- Impact
- Per http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/ Affected versions All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 383 All ruby 2.0 versions prior to ruby 2.0.0 rc2 or prior to trunk revision 39102
- Solution
- Per http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/ Affected versions All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 383 All ruby 2.0 versions prior to ruby 2.0.0 rc2 or prior to trunk revision 39102
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:rdoc:*:*:*:*:*:ruby:*:*", "vulnerable": true, "matchCriteriaId": "C60BA6CA-3872-433E-9CDA-465EFB11F230", "versionEndExcluding": "3.12", "versionStartIncluding": "2.3.0" }, { "criteria": "cpe:2.3:a:ruby-lang:rdoc:4.0.0:preview2:*:*:*:ruby:*:*", "vulnerable": true, "matchCriteriaId": "2C0C6748-AE0F-4E21-AA18-59583D5123AB" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94F5AA37-B466-4E2E-B217-5119BADDD87B" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DF0F0F5-4022-4837-9B40-4B1127732CC9" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3848B08-85C2-4AAD-AA33-CCEB80EF5B32" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7927D40-2A3A-43AD-99F6-CE61882A1FF4" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA406EC6-6CA5-40A6-A879-AA8940CBEF07" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90E0471D-1323-4E67-B66C-DEBF3BBAEEAA" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "285A3431-BDFE-40C5-92CD-B18217757C23" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D66B32CB-AC49-4A1C-85ED-6389F27CB319" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" } ], "operator": "OR" } ] } ]