CVE-2018-16471
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
Hay una posible vulnerabilidad Cross-Site Scripting (XSS) en Rack en versiones anteriores a la 2.0.6 y la 1.6.11. Las peticiones cuidadosamente manipuladas pueden provocar un impacto en los datos devueltos por el método "scheme" en "Rack::Request". Las aplicaciones que esperan que el esquema esté limitado a "http" o "https" y que no escapan el valor de retorno podrían ser vulnerables a un ataque Cross-Site Scripting (XSS). Nótese que las aplicaciones que emplean los mecanismos de escape normales proporcionados por Rails podrían no haberse visto impactados, pero las aplicaciones que omiten los mecanismos de escape o que no los emplean podrían ser vulnerables.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-09-04 CVE Reserved
- 2018-11-13 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://groups.google.com/forum/#%21topic/rubyonrails-security/GKsAFT924Ag | X_refsource_misc | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html | 2023-11-07 | |
https://usn.ubuntu.com/4089-1 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Rack Project Search vendor "Rack Project" | Rack Search vendor "Rack Project" for product "Rack" | >= 1.6.0 < 1.6.11 Search vendor "Rack Project" for product "Rack" and version " >= 1.6.0 < 1.6.11" | - |
Affected
| ||||||
Rack Project Search vendor "Rack Project" | Rack Search vendor "Rack Project" for product "Rack" | >= 2.0.0 < 2.0.6 Search vendor "Rack Project" for product "Rack" and version " >= 2.0.0 < 2.0.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|