CVE-2024-21636
CVSS V2 None
CVSS V3 None
Description
view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 and 2.83.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a `#call` method (i.e. instead of using a sidecar template) are affected. The return value of the `#call` method is not sanitized and can include user-defined content. In addition, the return value of the `#output_postamble` methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 and 2.83.0 have been released and fully mitigate both the `#call` and the `#output_postamble` vulnerabilities. As a workaround, sanitize the return value of `#call`.
Overview
- CVE ID
- CVE-2024-21636
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-01-04T20:09:08.564Z
- Last Modified Date
- 2024-01-09T15:49:12.734Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/ViewComponent/view_component/security/advisories/GHSA-wf2x-8w6j-qw37 | x_refsource_CONFIRM |
https://github.com/ViewComponent/view_component/pull/1950 | x_refsource_MISC |
https://github.com/ViewComponent/view_component/pull/1962 | x_refsource_MISC |
https://github.com/ViewComponent/view_component/commit/0d26944a8d2730ea40e60eae23d70684483e5017 | x_refsource_MISC |
https://github.com/ViewComponent/view_component/commit/c43d8bafa7117cbce479669a423ab266de150697 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-21636 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21636 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 15:15:21 | Added to TrackCVE |