Vulnerability Description
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Resque | Resque | < 2.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07Patch
- https://github.com/resque/resque/pull/1790Patch
- https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8PatchVendor Advisory
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-507Third Party Advisory
- https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07Patch
- https://github.com/resque/resque/pull/1790Patch
- https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8PatchVendor Advisory
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-507Third Party Advisory
FAQ
What is CVE-2023-50725?
CVE-2023-50725 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to re...
How severe is CVE-2023-50725?
CVE-2023-50725 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-50725?
Check the references section above for vendor advisories and patch information. Affected products include: Resque Resque.