CVE-2020-5267

NameCVE-2020-5267
DescriptionIn ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2149-1
Debian Bugs954304

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)buster2:5.2.2.1+dfsg-1+deb10u3fixed
buster (security)2:5.2.2.1+dfsg-1+deb10u5fixed
bullseye (security), bullseye2:6.0.3.7+dfsg-2+deb11u2fixed
bookworm2:6.1.7.3+dfsg-1fixed
trixie, sid2:6.1.7.3+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssourcejessie2:4.1.8-1+deb8u6DLA-2149-1
railssourcestretch2:4.2.7.1-1+deb9u2
railssourcebuster2:5.2.2.1+dfsg-1+deb10u1
railssource(unstable)2:5.2.4.1+dfsg-2954304

Notes

https://www.openwall.com/lists/oss-security/2020/03/19/1
https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a (master)

Search for package or bug name: Reporting problems