You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
CVE-2011-4319 - Medium Severity Vulnerability
path: /tmp/git/sample_app/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-3.0.1.gem
Dependency Hierarchy:
Cross-site scripting (XSS) vulnerability in the i18n translations helper method in Ruby on Rails 3.0.x before 3.0.11 and 3.1.x before 3.1.2, and the rails_xss plugin in Ruby on Rails 2.3.x, allows remote attackers to inject arbitrary web script or HTML via vectors related to a translations string whose name ends with an "html" substring.
Publish Date: 2011-11-28
URL: CVE-2011-4319
Base Score Metrics not available
Type: Upgrade version
Origin: http://www.securitytracker.com/id?1026342
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (3.0.11, 3.1.2).
The vendor's advisory is available at:
http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: