4.3
CVSSv2

CVE-2009-3009

Published: 08/09/2009 Updated: 08/08/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in Ruby on Rails 2.x prior to 2.2.3, and 2.3.x prior to 2.3.4, allows remote malicious users to inject arbitrary web script or HTML by placing malformed Unicode strings into a form helper.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 2.0.0

rubyonrails rails 2.0.1

rubyonrails rails 2.2.2

rubyonrails rails 2.2.0

rubyonrails rails 2.2.1

rubyonrails rails 2.0.2

rubyonrails rails 2.0.4

rubyonrails rails 2.1.0

rubyonrails rails 2.3.2

rubyonrails rails 2.1.1

rubyonrails rails 2.1.2

rubyonrails rails 2.3.3

Vendor Advisories

Debian Bug report logs - #545063 Security fixes (incl CVE-2009-3009) Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Jan Lühr <yanosz@gmxnet> Date: Fri, 4 Sep 2009 18:18:0 ...
Brian Mastenbrook discovered that rails, the MVC ruby based framework geared for web application development, is prone to cross-site scripting attacks via malformed strings in the form helper For the oldstable distribution (etch) security support has been discontinued It has been reported that rails in oldstable is unusable and several features t ...