Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubyonrails | Rails | 2.0.0 |
Related Weaknesses (CWE)
References
- http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=sPatch
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html
- http://secunia.com/advisories/43274
- http://secunia.com/advisories/43666
- http://www.debian.org/security/2011/dsa-2247
- http://www.securityfocus.com/bid/46291
- http://www.securitytracker.com/id?1025064
- http://www.vupen.com/english/advisories/2011/0587
- http://www.vupen.com/english/advisories/2011/0877
- http://groups.google.com/group/rubyonrails-security/msg/365b8a23b76a6b4a?dmode=sPatch
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055074.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055088.html
FAQ
What is CVE-2011-0446?
CVE-2011-0446 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbit...
How severe is CVE-2011-0446?
CVE-2011-0446 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0446?
Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Rails.