Bugzilla – Bug 856831
VUL-0: CVE-2013-6459: rubygem-will_paginate: XSS vulnerabilities
Last modified: 2014-03-13 16:19:21 UTC
via oss-sec CVE-2013-6459 https://bugzilla.redhat.com/show_bug.cgi?id=1046642 Cross-Site Scripting (XSS) vulnerabilities were found in will_paginate gem for Ruby, where certain input related to generated pagination links were not properly sanitised before being returned. This could be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6459 https://bugzilla.redhat.com/show_bug.cgi?id=1046642 http://comments.gmane.org/gmane.comp.security.oss.general/11747
so far used by SLMS as far as I see. does it get user input there? if yes, we should update.
bugbot adjusting priority
Created attachment 573969 [details] patch from upstream
@jreidinger: can you please provide us with some info on https://bugzilla.novell.com/show_bug.cgi?id=856831#c1
@jreidinger: I have the packages ready. Should I submit them?
yes, we use such input. But it is only after login, so risk is not critical
The SWAMPID for this issue is 55872. This issue was rated as moderate. Please submit fixed packages until 2014-01-29. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
Packages submited and bug reassigned.
Update released for: rubygem-will_paginate, rubygem-will_paginate-doc, rubygem-will_paginate-testsuite Products: SLE-SLMS 1.3 (x86_64)
SUSE-SU-2014:0161-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 856831 CVE References: CVE-2013-6459 Sources used: SUSE Lifecycle Management Server 1.3 (src): rubygem-will_paginate-3.0.3-0.9.1
released