Vulnerability Description
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rails Admin Project | Rails Admin | 1.2.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102486Broken LinkThird Party AdvisoryVDB Entry
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450ExploitThird Party Advisory
- http://www.securityfocus.com/bid/102486Broken LinkThird Party AdvisoryVDB Entry
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450ExploitThird Party Advisory
FAQ
What is CVE-2017-12098?
CVE-2017-12098 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an...
How severe is CVE-2017-12098?
CVE-2017-12098 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-12098?
Check the references section above for vendor advisories and patch information. Affected products include: Rails Admin Project Rails Admin.