Bug 1065520 - (CVE-2014-0081) CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage and number_to_human XSS vulnerability
CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage an...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1065587 1065588 1065589 1065590 1065591 1065592 1065593 1065891 1066666 1165362
Blocks: 1065543
  Show dependency treegraph
Reported: 2014-02-14 15:41 EST by Kurt Seifried
Modified: 2016-12-04 15:34 EST (History)
38 users (show)

See Also:
Fixed In Version: rubygem-actionpack 3.2.17, rubygem-actionpack 4.0.3, rubygem-actionpack 4.1.0.beta2
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
3-2-number_helpers_xss.patch (8.92 KB, patch)
2014-02-14 16:41 EST, Kurt Seifried
no flags Details | Diff
4-0-number_helpers_xss.patch (10.65 KB, patch)
2014-02-14 16:41 EST, Kurt Seifried
no flags Details | Diff
4-1-beta-number_helpers_xss.patch (8.08 KB, patch)
2014-02-14 16:41 EST, Kurt Seifried
no flags Details | Diff

  None (edit)
Description Kurt Seifried 2014-02-14 15:41:07 EST
Aaron Patterson of the Ruby on Rails project reports:

There is an XSS vulnerability in the number_to_currency, number_to_percentage
and number_to_human helpers in Ruby on Rails. 

Versions Affected:  All.
Fixed Versions:     4.1.0.beta2, 4.0.3, 3.2.17.

These helpers allows users to nicely format a numeric value. Some of the parameters
to the helper (format, negative_format and units) are not escaped correctly.
Application which pass user controlled data as one of these parameters are
vulnerable to an XSS attack.

All users passing user controlled data to these parameters of the number helpers
should either upgrade or use one of the workarounds immediately.
Comment 1 Kurt Seifried 2014-02-14 16:41:13 EST
Created attachment 863436 [details]
Comment 2 Kurt Seifried 2014-02-14 16:41:34 EST
Created attachment 863437 [details]
Comment 3 Kurt Seifried 2014-02-14 16:41:52 EST
Created attachment 863438 [details]
Comment 4 Kurt Seifried 2014-02-14 23:41:28 EST

Red Hat would like to thank the Ruby on Rails Project for reporting this issue. Upstream acknowledges Kevin Reintjes as the original reporter.
Comment 11 Vincent Danen 2014-02-18 15:49:08 EST
Created rubygem-actionpack tracking bugs for this issue:

Affects: fedora-all [bug 1066666]
Comment 13 Fedora Update System 2014-03-10 23:59:53 EDT
rubygem-activerecord-4.0.0-2.fc20, rubygem-actionpack-4.0.0-3.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 errata-xmlrpc 2014-03-11 12:59:35 EDT
This issue has been addressed in following products:

  CloudForms Management Engine 5.x

Via RHSA-2014:0215 https://rhn.redhat.com/errata/RHSA-2014-0215.html
Comment 15 errata-xmlrpc 2014-03-17 13:33:08 EDT
This issue has been addressed in following products:

  Red Hat Software Collections for RHEL-6

Via RHSA-2014:0306 https://rhn.redhat.com/errata/RHSA-2014-0306.html
Comment 16 Kurt Seifried 2014-06-25 03:24:11 EDT

Red Hat OpenShift Enterprise 1.2 is now in Production 1 Phase of the support
and maintenance life cycle. This has been rated as having Moderate security
impact and is not currently planned to be addressed in future updates. For
additional information, refer to the Red Hat OpenShift Enterprise Life Cycle:

Note You need to log in before you can comment on or make changes to this bug.