Upstream information
Description
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.SUSE information
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5 |
Vector | AV:N/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
SUSE Security Advisories:
- openSUSE-SU-2015:1260-1
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA ruby2.2-rubygem-jquery-rails-4.2.1-1.1 openSUSE Tumbleweed GA ruby2.7-rubygem-jquery-rails-4.4.0-1.7 openSUSE Tumbleweed GA ruby3.1-rubygem-jquery-rails-4.5.0-1.1 openSUSE Tumbleweed GA ruby3.2-rubygem-jquery-rails-4.5.1-1.3 |
SUSE Timeline for this CVE
CVE page created: Mon Jun 15 23:23:09 2015CVE page last modified: Thu Dec 7 13:08:28 2023