CVE-2009-4214
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
07/12/2009
Last modified:
09/04/2025
Description
Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rubyonrails:rails:2.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:2.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:2.3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5
- http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1
- http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
- http://secunia.com/advisories/37446
- http://secunia.com/advisories/38915
- http://support.apple.com/kb/HT4077
- http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released
- http://www.debian.org/security/2011/dsa-2260
- http://www.debian.org/security/2011/dsa-2301
- http://www.openwall.com/lists/oss-security/2009/11/27/2
- http://www.openwall.com/lists/oss-security/2009/12/08/3
- http://www.securityfocus.com/bid/37142
- http://www.securitytracker.com/id?1023245=
- http://www.vupen.com/english/advisories/2009/3352
- http://github.com/rails/rails/commit/bfe032858077bb2946abe25e95e485ba6da86bd5
- http://groups.google.com/group/rubyonrails-security/browse_thread/thread/4d4f71f2aef4c0ab?pli=1
- http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
- http://secunia.com/advisories/37446
- http://secunia.com/advisories/38915
- http://support.apple.com/kb/HT4077
- http://weblog.rubyonrails.org/2009/11/30/ruby-on-rails-2-3-5-released
- http://www.debian.org/security/2011/dsa-2260
- http://www.debian.org/security/2011/dsa-2301
- http://www.openwall.com/lists/oss-security/2009/11/27/2
- http://www.openwall.com/lists/oss-security/2009/12/08/3
- http://www.securityfocus.com/bid/37142
- http://www.securitytracker.com/id?1023245=
- http://www.vupen.com/english/advisories/2009/3352



