Arch Linux Security Advisory ASA-201910-4
========================================
Severity: Medium
Date    : 2019-10-02
CVE-ID  : CVE-2012-6708 CVE-2015-9251
Package : ruby-rdoc
Type    : cross-site scripting
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1041

Summary
======
The package ruby-rdoc before version 6.1.2-1 is vulnerable to cross-site scripting.

Resolution
=========
Upgrade to 6.1.2-1.

# pacman -Syu "ruby-rdoc>=6.1.2-1"

The problems have been fixed upstream in version 6.1.2.

Workaround
=========
None.

Description
==========
- CVE-2012-6708 (cross-site scripting)

jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS)
attacks. The jQuery(strInput) function does not differentiate selectors
from HTML in a reliable fashion. In vulnerable versions, jQuery
determined whether the input was HTML by looking for the '<' character
anywhere in the string, giving attackers more flexibility when
attempting to construct a malicious payload. In fixed versions, jQuery
only deems the input to be HTML if it explicitly starts with the '<'
character, limiting exploitability only to attackers who can control
the beginning of a string, which is far less common.

- CVE-2015-9251 (cross-site scripting)

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks
when a cross-domain Ajax request is performed without the dataType
option, causing text/javascript responses to be executed.

Impact
=====
An attacker is able to perform cross-side scripting attacks by tricking
users to generate documentation with a vulnerable RDoc version. RDoc is
a static documentation generation tool, patching the tool itself is
insufficient to mitigate these vulnerabilities. Documentations
generated with previous versions have to be re-generated with newer
RDoc.

References
=========
https://bugs.archlinux.org/task/63978
https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/
https://bugs.jquery.com/ticket/11290/
https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d
https://github.com/jquery/jquery/issues/2432
https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc
https://security.archlinux.org/CVE-2012-6708
https://security.archlinux.org/CVE-2015-9251

ArchLinux: 201910-4: ruby-rdoc: cross-site scripting

October 3, 2019

Summary

- CVE-2012-6708 (cross-site scripting) jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
- CVE-2015-9251 (cross-site scripting)
jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

Resolution

Upgrade to 6.1.2-1. # pacman -Syu "ruby-rdoc>=6.1.2-1"
The problems have been fixed upstream in version 6.1.2.

References

https://bugs.archlinux.org/task/63978 https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/ https://bugs.jquery.com/ticket/11290/ https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d https://github.com/jquery/jquery/issues/2432 https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc https://security.archlinux.org/CVE-2012-6708 https://security.archlinux.org/CVE-2015-9251

Severity
Package : ruby-rdoc
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1041

Workaround

None.

Related News