|
| 1 | +--- |
| 2 | +gem: actionview |
| 3 | +framework: rails |
| 4 | +cve: 2023-23913 |
| 5 | +url: https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468 |
| 6 | +title: DOM Based Cross-site Scripting in rails-ujs for |
| 7 | + contenteditable HTML Elements |
| 8 | +date: 2023-03-13 |
| 9 | +description: | |
| 10 | + NOTE: rails-ujs is part of Rails/actionview since 5.1.0. |
| 11 | +
|
| 12 | + There is a potential DOM based cross-site scripting issue in rails-ujs |
| 13 | + which leverages the Clipboard API to target HTML elements that are |
| 14 | + assigned the contenteditable attribute. This has the potential to |
| 15 | + occur when pasting malicious HTML content from the clipboard that |
| 16 | + includes a data-method, data-remote or data-disable-with attribute. |
| 17 | +
|
| 18 | + This vulnerability has been assigned the CVE identifier CVE-2023-23913. |
| 19 | +
|
| 20 | + Not affected: < 5.1.0 |
| 21 | + Versions Affected: >= 5.1.0 |
| 22 | + Fixed Versions: 6.1.7.3, 7.0.4.3 |
| 23 | +
|
| 24 | + Impact |
| 25 | + If the specified malicious HTML clipboard content is provided to a |
| 26 | + contenteditable element, this could result in the arbitrary execution |
| 27 | + of javascript on the origin in question. |
| 28 | +
|
| 29 | + Releases |
| 30 | + The FIXED releases are available at the normal locations. |
| 31 | +
|
| 32 | + Workarounds |
| 33 | + We recommend that all users upgrade to one of the FIXED versions. |
| 34 | + In the meantime, users can attempt to mitigate this vulnerability |
| 35 | + by removing the contenteditable attribute from elements in pages |
| 36 | + that rails-ujs will interact with. |
| 37 | +
|
| 38 | + Patches |
| 39 | + To aid users who aren’t able to upgrade immediately we have provided |
| 40 | + patches for the two supported release series. They are in git-am |
| 41 | + format and consist of a single changeset. |
| 42 | +
|
| 43 | + * rails-ujs-data-method-contenteditable-6-1.patch - Patch for 6.1 series |
| 44 | + * rails-ujs-data-method-contenteditable-7-0.patch - Patch for 7.0 series |
| 45 | +
|
| 46 | + Please note that only the 7.0.Z and 6.1.Z series are |
| 47 | + supported at present, and 6.0.Z for severe vulnerabilities. |
| 48 | +
|
| 49 | + Users of earlier unsupported releases are advised to upgrade as |
| 50 | + soon as possible as we cannot guarantee the continued availability |
| 51 | + of security fixes for unsupported releases. |
| 52 | +
|
| 53 | + Credits |
| 54 | + We would like to thank ryotak 15 for reporting this! |
| 55 | +
|
| 56 | + * rails-ujs-data-method-contenteditable-6-1.patch (8.5 KB) |
| 57 | + * rails-ujs-data-method-contenteditable-7-0.patch (8.5 KB) |
| 58 | + * rails-ujs-data-method-contenteditable-main.patch (8.9 KB) |
| 59 | +
|
| 60 | +cvss_v3: 7.5 |
| 61 | +unaffected_versions: |
| 62 | + - "< 5.1.0" |
| 63 | +patched_versions: |
| 64 | + - "~> 6.1.7.3" |
| 65 | + - ">= 7.0.4.3" |
| 66 | +related: |
| 67 | + url: |
| 68 | + - https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468 |
| 69 | + - https://www.cve.org/CVERecord?id=CVE-2023-23913 |
| 70 | + - https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=aa67066c383f12dee5aee964667de4d8 |
| 71 | + - https://access.redhat.com/security/cve/cve-2023-23913 |
| 72 | + - https://bugzilla.redhat.com/show_bug.cgi?id=2182160 |
| 73 | + - https://security.snyk.io/vuln/SNYK-RUBY-RAILS-5291540 |
| 74 | + - https://www.suse.com/security/cve/CVE-2023-23913.html |
| 75 | + - https://security-tracker.debian.org/tracker/CVE-2023-23913 |
| 76 | + - https://www.mend.io/vulnerability-database/CVE-2023-23913 |
| 77 | + - https://github.com/jasnow/gsd-database/blob/main/2023/23xxx/GSD-2023-23913.json |
| 78 | +notes: "CVE has been reserved, but not filled out." |
0 commit comments