Vulnerability Change Records for CVE-2024-21636
Change History
New CVE Received by NIST 1/04/2024 3:15:25 PM
Action |
Type |
Old Value |
New Value |
Added |
CVSS V3.1 |
|
GitHub, Inc. AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
Added |
CWE |
|
GitHub, Inc. CWE-79
|
Added |
Description |
|
view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a `#call` method (i.e. instead of using a sidecar template) are affected. The return value of the `#call` method is not sanitized and can include user-defined content. In addition, the return value of the `#output_postamble` methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 has been released and fully mitigates both the `#call` and the `#output_postamble` vulnerabilities. As a workaround, sanitize the return value of `#call`.
|
Added |
Reference |
|
GitHub, Inc. https://github.com/ViewComponent/view_component/commit/0d26944a8d2730ea40e60eae23d70684483e5017 [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/ViewComponent/view_component/pull/1950 [No types assigned]
|
Added |
Reference |
|
GitHub, Inc. https://github.com/ViewComponent/view_component/security/advisories/GHSA-wf2x-8w6j-qw37 [No types assigned]
|
|