Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1036910 - (CVE-2013-6415) CVE-2013-6415 rubygem-actionpack: number_to_currency XSS
CVE-2013-6415 rubygem-actionpack: number_to_currency XSS
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20131203,repor...
: Security
Depends On: 1036415 1036420 1036421 1037487 1120007 1120008 1159435 1165381 1165382
Blocks: 1000138 1036411
  Show dependency treegraph
 
Reported: 2013-12-02 16:38 EST by Tomas Hoger
Modified: 2016-04-26 12:42 EDT (History)
37 users (show)

See Also:
Fixed In Version: rubygem-actionpack 3.2.16, rubygem-actionpack 4.0.2
Doc Type: Bug Fix
Doc Text:
It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-01-17 00:35:41 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Upstream patch for 3.2.x (2.83 KB, patch)
2013-12-02 16:47 EST, Tomas Hoger
no flags Details | Diff
Upstream patch for 4.0.x (2.20 KB, patch)
2013-12-02 16:48 EST, Tomas Hoger
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:1794 normal SHIPPED_LIVE Important: ruby193-rubygem-actionpack security update 2013-12-05 22:00:44 EST
Red Hat Product Errata RHSA-2014:0008 normal SHIPPED_LIVE Important: ruby193-rubygem-actionpack security update 2014-01-06 18:02:25 EST
Red Hat Product Errata RHSA-2014:1863 normal SHIPPED_LIVE Important: Subscription Asset Manager 1.4 security update 2014-11-17 17:08:19 EST

  None (edit)
Description Tomas Hoger 2013-12-02 16:38:24 EST
Quoting from an upcoming Ruby on Rails security advisory:


XSS Vulnerability in number_to_currency

There is an XSS vulnerability in the number_to_currency helper in Ruby on Rails. This vulnerability has been assigned the CVE identifier CVE-2013-6415.

Versions Affected:  All.
Fixed Versions:     4.0.2, 3.2.16.

Impact 
------ 
The number_to_currency helper allows users to nicely format a numeric value. One of the parameters to the helper (unit) is not escaped correctly.  Application which pass user controlled data as the unit parameter are vulnerable to an XSS attack.

All users passing user controlled data as number_to_currency's unit parameters should either upgrade or use one of the workarounds immediately. 

Releases 
-------- 
The 4.0.2 and 3.2.16 releases are available at the normal locations. 

Credits 
------- 
Thanks to Ankit Gupta for reporting the issue to us and working with us on a fix.
Comment 1 Tomas Hoger 2013-12-02 16:47:28 EST
Created attachment 831790 [details]
Upstream patch for 3.2.x
Comment 2 Tomas Hoger 2013-12-02 16:48:38 EST
Created attachment 831792 [details]
Upstream patch for 4.0.x
Comment 9 errata-xmlrpc 2013-12-05 17:04:29 EST
This issue has been addressed in following products:

  Red Hat Software Collections for RHEL-6

Via RHSA-2013:1794 https://rhn.redhat.com/errata/RHSA-2013-1794.html
Comment 10 errata-xmlrpc 2014-01-06 13:04:48 EST
This issue has been addressed in following products:

  OpenStack 3 for RHEL 6

Via RHSA-2014:0008 https://rhn.redhat.com/errata/RHSA-2014-0008.html
Comment 14 Kurt Seifried 2014-11-13 01:22:09 EST
Acknowledgements:

Red Hat would like to thank Ruby on Rails upstream for reporting this issue. Upstream acknowledges Ankit Gupta as the original reporter.
Comment 15 Martin Prpič 2014-11-14 11:21:41 EST
IssueDescription:

It was found that the number_to_currency Action View helper did not properly escape the unit parameter. An attacker could use this flaw to perform a cross-site scripting (XSS) attack on an application that uses data submitted by a user in the unit parameter.
Comment 16 errata-xmlrpc 2014-11-17 12:09:09 EST
This issue has been addressed in the following products:

  Red Hat Subscription Asset Manager 1.4

Via RHSA-2014:1863 https://rhn.redhat.com/errata/RHSA-2014-1863.html

Note You need to log in before you can comment on or make changes to this bug.