CVE-2020-5267

NameCVE-2020-5267
DescriptionIn ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2149-1
NVD severitylow
Debian Bugs954304

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)stretch2:4.2.7.1-1+deb9u1vulnerable
buster2:5.2.2.1+dfsg-1+deb10u1fixed
bullseye, sid2:5.2.4.3+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssource(unstable)2:5.2.4.1+dfsg-2954304
railssourcebuster2:5.2.2.1+dfsg-1+deb10u1
railssourcejessie2:4.1.8-1+deb8u6DLA-2149-1

Notes

[stretch] - rails <no-dsa> (Minor issue)
https://www.openwall.com/lists/oss-security/2020/03/19/1
https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a (master)

Search for package or bug name: Reporting problems