You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
CVE-2011-2931 - Medium Severity Vulnerability
path: /tmp/git/sample_app/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-3.0.1.gem
Dependency Hierarchy:
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
Publish Date: 2011-08-29
URL: CVE-2011-2931
Base Score Metrics not available
Type: Upgrade version
Origin: https://security.gentoo.org/glsa/201412-28
Release Date: 2014-12-14
Fix Resolution: All Ruby on Rails 2.x users should upgrade to the latest version >= rails-2.3.18
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: