Description
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3207 | Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1. |
Github GHSA |
GHSA-gc3j-vvwf-4rp8 | Resque vulnerable to reflected XSS in resque-web failed and queues lists |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T22:16:47.164Z
Reserved: 2023-12-11T17:53:36.031Z
Link: CVE-2023-50725
No data.
Status : Modified
Published: 2023-12-22T20:15:07.657
Modified: 2024-11-21T08:37:13.120
Link: CVE-2023-50725
OpenCVE Enrichment
No data.
EUVD
Github GHSA