NA

CVE-2012-1099

Published: 13/03/2012 Updated: 08/08/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x prior to 3.0.12, 3.1.x prior to 3.1.4, and 3.2.x prior to 3.2.2 allows remote malicious users to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.

Affected Products

Vendor Product Versions
RubyonrailsRails3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, 3.0.12, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.2.0, 3.2.1, 3.2.2
RubyonrailsRuby On Rails3.0.4

Vendor Advisories

Debian Bug report logs - #668607 CVE-2012-1099: Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helperrb in the select helper in Ruby on Rails 30x Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rai ...
Debian Bug report logs - #668977 CVE-2012-1098: Cross-site scripting (XSS) vulnerability in Ruby on Rails 30x [check if applies to RoR 23] Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Report ...
Sergey Nartimov discovered that in Rails, a Ruby based framework for web development, when developers generate html options tags manually, user input concatenated with manually built tags may not be escaped and an attacker can inject arbitrary HTML into the document For the stable distribution (squeeze), this problem has been fixed in version 23 ...