Vulnerability Description
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gon Project | Gon | < 6.4.0 |
| Canonical | Ubuntu Linux | 18.04 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/09/msg00018.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4560-1/Third Party Advisory
- https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/09/msg00018.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4560-1/Third Party Advisory
FAQ
What is CVE-2020-25739?
CVE-2020-25739 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon...
How severe is CVE-2020-25739?
CVE-2020-25739 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-25739?
Check the references section above for vendor advisories and patch information. Affected products include: Gon Project Gon, Canonical Ubuntu Linux, Debian Debian Linux.