Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
References
Link | Resource |
---|---|
https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07 | Patch |
https://github.com/resque/resque/pull/1790 | Patch |
https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8 | Patch Vendor Advisory |
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50725.yml | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-12-22 20:15
Updated : 2024-01-03 03:20
NVD link : CVE-2023-50725
Mitre link : CVE-2023-50725
CVE.ORG link : CVE-2023-50725
JSON object : View
Products Affected
resque
- resque
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')