Description
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
Published: 2023-12-22
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-3207 Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
Github GHSA Github GHSA GHSA-gc3j-vvwf-4rp8 Resque vulnerable to reflected XSS in resque-web failed and queues lists
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T22:16:47.164Z

Reserved: 2023-12-11T17:53:36.031Z

Link: CVE-2023-50725

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-22T20:15:07.657

Modified: 2024-11-21T08:37:13.120

Link: CVE-2023-50725

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-12-19T00:00:00Z

Links: CVE-2023-50725 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses