Skip to main content

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CVE-2024-54133

Severity Low
Score 2.3/10

Summary

Action Pack is a framework for handling and responding to web requests. There is a possible Cross-Site Scripting (XSS) vulnerability in the `content_security_policy` helper of Action Pack. Applications that set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. This issue affects the package actionpack version 5.2.0.beta1 through 7.0.8.6, 7.1.0.beta1 through 7.1.5, 7.2.0.beta1 through 7.2.2, and 8.0.0.beta1 through 8.0.0. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input.

  • LOW
  • NETWORK
  • PASSIVE
  • NONE

CWE-79 - Cross Site Scripting

Cross-Site Scripting, commonly referred to as XSS, is the most dominant class of vulnerabilities. It allows an attacker to inject malicious code into a pregnable web application and victimize its users. The exploitation of such a weakness can cause severe issues such as account takeover, and sensitive data exfiltration. Because of the prevalence of XSS vulnerabilities and their high rate of exploitation, it has remained in the OWASP top 10 vulnerabilities for years.

Advisory Timeline

  • Published