4.3
CVSSv2

CVE-2012-1099

Published: 13/03/2012 Updated: 08/08/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x prior to 3.0.12, 3.1.x prior to 3.1.4, and 3.2.x prior to 3.2.2 allows remote malicious users to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 3.0.8

rubyonrails rails 3.0.6

rubyonrails rails 3.0.7

rubyonrails rails 3.0.4

rubyonrails rails 3.0.9

rubyonrails rails 3.0.1

rubyonrails rails 3.0.2

rubyonrails rails 3.0.10

rubyonrails rails 3.0.0

rubyonrails rails 3.0.5

rubyonrails ruby on rails 3.0.4

rubyonrails rails 3.0.12

rubyonrails rails 3.0.3

rubyonrails rails 3.0.11

rubyonrails rails 3.1.0

rubyonrails rails 3.1.1

rubyonrails rails 3.1.2

rubyonrails rails 3.1.3

rubyonrails rails 3.1.4

rubyonrails rails 3.2.0

rubyonrails rails 3.2.1

rubyonrails rails 3.2.2

Vendor Advisories

Debian Bug report logs - #668977 CVE-2012-1098: Cross-site scripting (XSS) vulnerability in Ruby on Rails 30x [check if applies to RoR 23] Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Report ...
Debian Bug report logs - #668607 CVE-2012-1099: Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helperrb in the select helper in Ruby on Rails 30x Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rai ...
Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document For the stable distribution (squeeze), this problem has been fixed in version 23 ...