Skip to content

Inline SVG vulnerable to Cross-site Scripting

Moderate severity GitHub Reviewed Published Jan 7, 2023 to the GitHub Advisory Database • Updated Oct 20, 2023

Package

bundler inline_svg (RubyGems)

Affected versions

< 1.7.2

Patched versions

1.7.2

Description

A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file lib/inline_svg/action_view/helpers.rb of the component URL Parameter Handler. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The name of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability.

References

Published by the National Vulnerability Database Jan 7, 2023
Published to the GitHub Advisory Database Jan 7, 2023
Reviewed Jan 9, 2023
Last updated Oct 20, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2020-36644

GHSA ID

GHSA-p33q-4h4m-j994
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.