Version 8.0.1
actionview
Ruby on Rails
Install Instructions
gem install actionview
Current Version Release Date December 13, 2024
Language Ruby
Package URL (purl) pkg:gem/actionview@8.0.1
Find actionview
vulnerabilities in your supply chain.
actionview Vulnerabilities
Sort by
CVE (Latest)
CVE |
CVSS Score |
CWE(s) |
EPSS Score |
EPSS % |
Impacted Versions |
---|---|---|---|---|---|
CVE-2019-5418 | High 7.5 | CWE-22 | 0.97307 | 0.99943 |
|
CVE-2019-5419 | High 7.5 | CWE-400, CWE-770 | 0.0029 | 0.68899 |
|
CVE-2020-15169 | Medium 5.4 | CWE-79 | 0.00207 | 0.5879 |
|
CVE-2020-5267 | Medium 4 | CWE-80, CWE-79 | 0.00195 | 0.57556 |
|
CVE-2020-8167 | Medium 6.5 | CWE-352 | 0.0008 | 0.36913 |
|
CVE-2022-27777 | Medium 6.1 | CWE-79 | 0.00137 | 0.50045 |
|
CVE-2023-23913 | Medium 6.3 | CWE-79 | 0.00045 | 0.17795 |
|
CVE-2016-0752 | High 7.5 | CWE-22, CWE-200 | 0.97293 | 0.99938 |
|
CVE-2016-2097 | Medium 5.3 | CWE-22, CWE-200 | 0.00822 | 0.81871 |
|
CVE-2016-6316 | Medium 6.1 | CWE-79 | 0.0037 | 0.72562 |
|
CVE-2020-8163 | High 8.8 | CWE-94 | 0.96497 | 0.99727 |
|
actionview Vulnerability Remediation Guidance
CVE | Description | Full list of Impacted Versions | Fix |
---|---|---|---|
CVE-2023-23913 | There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute. | 5.1.2.rc1, 6.0.0, 5.2.2, 5.1.0, 5.2.4.3, 5.1.6.1, 5.1.6, 5.1.4 (Show all) | Patch → 6.1.7.3 |
CVE-2022-27777 | A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes. | 5.0.5, 5.1.2.rc1, 6.0.0, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.2.4.3 (Show all) | Patch → 6.1.7.3 |
CVE-2020-8167 | A CSRF vulnerability exists in rails <= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains. | 5.0.5, 5.1.2.rc1, 6.0.0, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6, 5.1.4 (Show all) | Patch → 6.1.7.3 |
CVE-2020-8163 | The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE. | 4.1.13.rc1, 4.2.0.beta3, 4.2.2, 4.2.0.beta1, 4.2.3, 4.2.0.rc3, 4.1.10, 4.1.0.beta2 (Show all) | Patch → 6.1.7.3 |
CVE-2020-5267 | In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2. | 5.0.5, 5.1.2.rc1, 6.0.0, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1 (Show all) | Patch → 6.1.7.3 |
CVE-2020-15169 | In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory. | 5.0.5, 5.1.2.rc1, 6.0.0, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.2.4.3 (Show all) | Patch → 6.1.7.3 |
CVE-2019-5419 | There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive. | 5.0.5, 5.1.2.rc1, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2019-5418 | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. | 5.0.5, 5.1.2.rc1, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2016-6316 | Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers. | 4.1.13.rc1, 4.2.0.beta3, 4.2.2, 4.2.0.beta1, 4.2.3, 4.2.0.rc3, 4.1.10, 4.1.0.beta2 (Show all) | Patch → 6.1.7.3 |
CVE-2016-2097 | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. | 4.1.13.rc1, 4.1.10, 4.1.0.beta2, 4.1.11, 4.1.10.rc1, 4.1.2.rc2, 4.1.0, 4.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2016-0752 | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. | 4.1.13.rc1, 4.2.2, 4.2.3, 4.1.10, 4.1.0.beta2, 4.1.11, 4.1.10.rc1, 4.1.2.rc2 (Show all) | Patch → 6.1.7.3 |
Instantly see if these actionview
vulnerabilities affect your code.
Dependencies
Packages using versions of actionview affected by its vulnerabilities
Dependent Packages |
---|
activesupport= 8.0.1 |
builder~> 3.1 |
erubi~> 1.11 |
rails-dom-testing~> 2.2 |
rails-html-sanitizer~> 1.6 |