MEDIUM · 4.0

CVE-2020-5267

In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be...

Vulnerability Description

In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2.

CVSS Score

4.0

MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
RubyonrailsActionview< 5.2.4.2
DebianDebian Linux8.0
FedoraprojectFedora33
OpensuseLeap15.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-5267?

CVE-2020-5267 is a vulnerability with a CVSS score of 4.0 (MEDIUM). In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be...

How severe is CVE-2020-5267?

CVE-2020-5267 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-5267?

Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Actionview, Debian Debian Linux, Fedoraproject Fedora, Opensuse Leap.