Bug 1036910 (CVE-2013-6415)

Summary: CVE-2013-6415 rubygem-actionpack: number_to_currency XSS
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aortega, apevec, athomas, ayoung, bdunne, bgollahe, bkearney, bleanhar, ccoleman, chrisw, cpelland, dmcphers, drieden, gkotton, gmollett, hhorak, iheim, jdetiber, jfrey, jialiu, jorton, jrafanie, jrusnack, kseifried, lhh, lmeyer, markmc, mmaslano, mmccune, mmcgrath, nobody+bgollahe, obarenbo, rbryant, ruby-maint, sclewis, security-response-team, tdawson, vondruch, xlecauch, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: rubygem-actionpack 3.2.16, rubygem-actionpack 4.0.2 Doc Type: Bug Fix
Doc Text:
It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-01-17 05:35:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1036415, 1036420, 1036421, 1037487, 1120007, 1120008, 1159435, 1165381, 1165382    
Bug Blocks: 1000138, 1036411    
Attachments:
Description Flags
Upstream patch for 3.2.x
none
Upstream patch for 4.0.x none

Description Tomas Hoger 2013-12-02 21:38:24 UTC
Quoting from an upcoming Ruby on Rails security advisory:


XSS Vulnerability in number_to_currency

There is an XSS vulnerability in the number_to_currency helper in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2013-6415.

Versions Affected:  All.
Fixed Versions:     4.0.2, 3.2.16.

Impact 
------ 
The number_to_currency helper allows users to nicely format a numeric value. One of the parameters to the helper (unit) is not escaped correctly.  Application which pass user controlled data as the unit parameter are vulnerable to an XSS attack.

All users passing user controlled data as number_to_currency's unit parameters should either upgrade or use one of the workarounds immediately. 

Releases 
-------- 
The 4.0.2 and 3.2.16 releases are available at the normal locations. 

Credits 
------- 
Thanks to Ankit Gupta for reporting the issue to us and working with us on a fix.

Comment 1 Tomas Hoger 2013-12-02 21:47:28 UTC
Created attachment 831790 [details]
Upstream patch for 3.2.x

Comment 2 Tomas Hoger 2013-12-02 21:48:38 UTC
Created attachment 831792 [details]
Upstream patch for 4.0.x

Comment 9 errata-xmlrpc 2013-12-05 22:04:29 UTC
This issue has been addressed in following products:

  Red Hat Software Collections for RHEL-6

Via RHSA-2013:1794 https://rhn.redhat.com/errata/RHSA-2013-1794.html

Comment 10 errata-xmlrpc 2014-01-06 18:04:48 UTC
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2014:0008 https://rhn.redhat.com/errata/RHSA-2014-0008.html

Comment 14 Kurt Seifried 2014-11-13 06:22:09 UTC
Acknowledgements:

Red Hat would like to thank Ruby on Rails upstream for reporting this issue. Upstream acknowledges Ankit Gupta as the original reporter.

Comment 15 Martin Prpič 2014-11-14 16:21:41 UTC
IssueDescription:

It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter.

Comment 16 errata-xmlrpc 2014-11-17 17:09:09 UTC
This issue has been addressed in the following products:

  Red Hat Subscription Asset Manager 1.4

Via RHSA-2014:1863 https://rhn.redhat.com/errata/RHSA-2014-1863.html