Vulnerability Description
Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubyonrails | Rails | 1.1.5 |
Related Weaknesses (CWE)
References
- http://bugs.gentoo.org/show_bug.cgi?id=195315
- http://dev.rubyonrails.org/ticket/8371
- http://osvdb.org/36378
- http://pastie.caboo.se/65550.txt
- http://secunia.com/advisories/25699Vendor Advisory
- http://secunia.com/advisories/27657Vendor Advisory
- http://secunia.com/advisories/27756Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200711-17.xml
- http://weblog.rubyonrails.org/2007/10/12/rails-1-2-5-maintenance-release
- http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release
- http://www.novell.com/linux/security/advisories/2007_24_sr.html
- http://www.securityfocus.com/bid/24161Exploit
- http://www.vupen.com/english/advisories/2007/2216Vendor Advisory
- http://bugs.gentoo.org/show_bug.cgi?id=195315
- http://dev.rubyonrails.org/ticket/8371
FAQ
What is CVE-2007-3227?
CVE-2007-3227 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input val...
How severe is CVE-2007-3227?
CVE-2007-3227 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3227?
Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Rails.