CVE-2022-24722
Published Mar 2, 2022
Last updated 3 years ago
Overview
- Description
- VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.31.2 and 2.49.1 have been released and fully mitigate the vulnerability. As a workaround, avoid passing user input to the `translate` function, or sanitize the inputs before passing them.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:github:viewcomponent:*:*:*:*:*:ruby_on_rails:*:*", "vulnerable": true, "matchCriteriaId": "8BFBC4AF-7D57-4CB1-9681-DFA439A5936A", "versionEndExcluding": "2.31.2", "versionStartIncluding": "2.31.0" }, { "criteria": "cpe:2.3:a:github:viewcomponent:*:*:*:*:*:ruby_on_rails:*:*", "vulnerable": true, "matchCriteriaId": "DA1CA9C8-326A-4337-915E-BEB92EA1BAD0", "versionEndExcluding": "2.49.1", "versionStartIncluding": "2.32.0" } ], "operator": "OR" } ] } ]