Version 8.0.0
actionview
Ruby on Rails
Install Instructions
gem install actionview
Current Version Release Date November 07, 2024
Language Ruby
Package URL (purl) pkg:gem/actionview@8.0.0
Find actionview
vulnerabilities in your supply chain.
actionview Vulnerabilities
Sort by
CVE (Latest)
CVE | CVSS Score | CWE(s) | EPSS Score | EPSS % | Impacted Versions |
---|---|---|---|---|---|
CVE-2019-5418 | High 7.5 | CWE-22 | 0.97445 | 0.99965 |
|
CVE-2019-5419 | High 7.5 | CWE-400, CWE-770 | 0.00282 | 0.6911 |
|
CVE-2020-15169 | Medium 6.1 | CWE-79 | 0.02192 | 0.89726 |
|
CVE-2020-5267 | Medium 4.8 | CWE-80, CWE-79 | 0.00121 | 0.47509 |
|
CVE-2020-8167 | Medium 6.5 | CWE-352 | 0.00219 | 0.6041 |
|
CVE-2022-27777 | Medium 6.1 | CWE-79 | 0.0008 | 0.35731 |
|
CVE-2023-23913 | Unknown | None | None |
|
|
CVE-2016-0752 | High 7.5 | CWE-200, CWE-22 | 0.9719 | 0.99858 |
|
CVE-2016-2097 | Medium 5.3 | CWE-200, CWE-22 | 0.01099 | 0.84894 |
|
CVE-2016-6316 | Medium 6.1 | CWE-79 | 0.00305 | 0.70286 |
|
CVE-2020-8163 | High 8.8 | CWE-94 | 0.96502 | 0.99644 |
|
actionview Vulnerability Remediation Guidance
CVE | Description | Full list of Impacted Versions | Fix |
---|---|---|---|
CVE-2023-23913 | NOTE: rails-ujs is part of Rails/actionview since 5.1.0. There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute. This vulnerability has been assigned the CVE identifier CVE-2023-23913. Not affected: < 5.1.0 Versions Affected: >= 5.1.0 Fixed Versions: 6.1.7.3, 7.0.4.3 Impact If the specified malicious HTML clipboard content is provided to a contenteditable element, this could result in the arbitrary execution of javascript on the origin in question. Releases The FIXED releases are available at the normal locations. Workarounds We recommend that all users upgrade to one of the FIXED versions. In the meantime, users can attempt to mitigate this vulnerability by removing the contenteditable attribute from elements in pages that rails-ujs will interact with. Patches To aid users who aren’t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series * rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits We would like to thank ryotak 15 for reporting this! * rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB) * rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB) * rails-ujs-data-method-contenteditable-main.patch (8.9 KB) | 5.1.2.rc1, 6.0.0, 5.2.4.3, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6, 5.1.4 (Show all) | Patch → 6.1.7.3 |
CVE-2022-27777 | A XSS Vulnerability in Action View tag helpers >= 5.2.0 and < 5.2.0 which would allow an attacker to inject content if able to control input into specific attributes. | 5.0.5, 5.1.2.rc1, 6.0.0, 5.2.4.3, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0 (Show all) | Patch → 6.1.7.3 |
CVE-2020-8167 | A CSRF vulnerability exists in rails <= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains. | 5.0.5, 5.1.2.rc1, 6.0.0, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6, 5.1.4 (Show all) | Patch → 6.1.7.3 |
CVE-2020-8163 | The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE. | 4.1.13.rc1, 4.2.0.beta3, 4.2.2, 4.2.0.beta1, 4.2.3, 4.2.0.rc3, 4.1.16.rc1, 4.1.0.beta2 (Show all) | Patch → 6.1.7.3 |
CVE-2020-5267 | In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks. The issue is fixed in versions 6.0.2.2 and 5.2.4.2. | 5.0.5, 5.1.2.rc1, 6.0.0, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1 (Show all) | Patch → 6.1.7.3 |
CVE-2020-15169 | In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory. | 5.0.5, 5.1.2.rc1, 6.0.0, 5.2.4.3, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0 (Show all) | Patch → 6.1.7.3 |
CVE-2019-5419 | There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive. | 5.0.5, 5.1.2.rc1, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2019-5418 | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. | 5.0.5, 5.1.2.rc1, 4.1.13.rc1, 4.2.0.beta3, 5.2.2, 5.1.0, 5.1.6.1, 5.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2016-6316 | Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers. | 4.1.13.rc1, 4.2.0.beta3, 4.2.2, 4.2.0.beta1, 4.2.3, 4.2.0.rc3, 4.1.16.rc1, 4.1.0.beta2 (Show all) | Patch → 6.1.7.3 |
CVE-2016-2097 | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. | 4.1.13.rc1, 4.1.0.beta2, 4.1.10, 4.1.11, 4.1.10.rc1, 4.1.2.rc2, 4.1.0, 4.1.6 (Show all) | Patch → 6.1.7.3 |
CVE-2016-0752 | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. | 4.1.13.rc1, 4.2.2, 4.2.3, 4.1.0.beta2, 4.1.10, 4.1.11, 4.1.10.rc1, 4.1.2.rc2 (Show all) | Patch → 6.1.7.3 |
Instantly see if these actionview
vulnerabilities affect your code.
Dependencies
Packages using versions of actionview affected by its vulnerabilities
Dependent Packages |
---|
activesupport= 8.0.0 |
builder~> 3.1 |
erubi~> 1.11 |
rails-dom-testing~> 2.2 |
rails-html-sanitizer~> 1.6 |