发布时间: 2024年11月22日
修改时间: 2024年11月22日
A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | |
Attack Vector | Network | |
CVSS评分 | N/A | 4.7 |
Attack Complexity | High | |
Privileges Required | None | |
Scope | Changed | |
Integrity | Low | |
User Interaction | Required | |
Availability | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4224 | rubygem-actionpack security update | 2024年11月22日 |
产品 | 包 | 状态 |
---|---|---|
KY3.5.2 | rubygem-actionpack | Fixed |