Name | CVE-2015-3226 |
Description | Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3464-1 |
Debian Bugs | 790486 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
rails (PTS) | bullseye (security), bullseye | 2:6.0.3.7+dfsg-2+deb11u2 | fixed |
| bookworm | 2:6.1.7.3+dfsg-2~deb12u1 | fixed |
| sid, trixie | 2:6.1.7.3+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - rails <end-of-life> (Unsupported in squeeze-lts)
[wheezy] - rails <not-affected> (Vulnerable code not present, is only a transitional package)
[wheezy] - ruby-activesupport-3.2 <not-affected> (Vulnerable code not present)
[wheezy] - ruby-activesupport-2.3 <end-of-life> (https://lists.debian.org/debian-security-announce/2014/msg00164.html)