Bug 1065520 (CVE-2014-0081) - CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage and number_to_human XSS vulnerability
Summary: CVE-2014-0081 rubygem-actionpack: number_to_currency, number_to_percentage an...
Alias: CVE-2014-0081
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1065587 1065588 1065589 1065590 1065591 1065592 1065593 1065891 1066666 1165362
Blocks: 1065543
TreeView+ depends on / blocked
Reported: 2014-02-14 20:41 UTC by Kurt Seifried
Modified: 2023-05-12 19:26 UTC (History)
34 users (show)

Fixed In Version: rubygem-actionpack 3.2.17, rubygem-actionpack 4.0.3, rubygem-actionpack 4.1.0.beta2
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2019-06-08 02:31:39 UTC

Attachments (Terms of Use)
3-2-number_helpers_xss.patch (8.92 KB, patch)
2014-02-14 21:41 UTC, Kurt Seifried
no flags Details | Diff
4-0-number_helpers_xss.patch (10.65 KB, patch)
2014-02-14 21:41 UTC, Kurt Seifried
no flags Details | Diff
4-1-beta-number_helpers_xss.patch (8.08 KB, patch)
2014-02-14 21:41 UTC, Kurt Seifried
no flags Details | Diff

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0215 0 normal SHIPPED_LIVE Critical: cfme security, bug fix, and enhancement update 2014-03-11 20:56:48 UTC
Red Hat Product Errata RHSA-2014:0306 0 normal SHIPPED_LIVE Moderate: ruby193-rubygem-actionpack security update 2014-03-17 21:31:51 UTC

Description Kurt Seifried 2014-02-14 20:41:07 UTC
Aaron Patterson of the Ruby on Rails project reports:

There is an XSS vulnerability in the number_to_currency, number_to_percentage
and number_to_human helpers in Ruby on Rails. 

Versions Affected:  All.
Fixed Versions:     4.1.0.beta2, 4.0.3, 3.2.17.

These helpers allows users to nicely format a numeric value. Some of the parameters
to the helper (format, negative_format and units) are not escaped correctly.
Application which pass user controlled data as one of these parameters are
vulnerable to an XSS attack.

All users passing user controlled data to these parameters of the number helpers
should either upgrade or use one of the workarounds immediately.

Comment 1 Kurt Seifried 2014-02-14 21:41:13 UTC
Created attachment 863436 [details]

Comment 2 Kurt Seifried 2014-02-14 21:41:34 UTC
Created attachment 863437 [details]

Comment 3 Kurt Seifried 2014-02-14 21:41:52 UTC
Created attachment 863438 [details]

Comment 4 Kurt Seifried 2014-02-15 04:41:28 UTC

Red Hat would like to thank the Ruby on Rails Project for reporting this issue. Upstream acknowledges Kevin Reintjes as the original reporter.

Comment 11 Vincent Danen 2014-02-18 20:49:08 UTC
Created rubygem-actionpack tracking bugs for this issue:

Affects: fedora-all [bug 1066666]

Comment 13 Fedora Update System 2014-03-11 03:59:53 UTC
rubygem-activerecord-4.0.0-2.fc20, rubygem-actionpack-4.0.0-3.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 errata-xmlrpc 2014-03-11 16:59:35 UTC
This issue has been addressed in following products:

  CloudForms Management Engine 5.x

Via RHSA-2014:0215 https://rhn.redhat.com/errata/RHSA-2014-0215.html

Comment 15 errata-xmlrpc 2014-03-17 17:33:08 UTC
This issue has been addressed in following products:

  Red Hat Software Collections for RHEL-6

Via RHSA-2014:0306 https://rhn.redhat.com/errata/RHSA-2014-0306.html

Comment 16 Kurt Seifried 2014-06-25 07:24:11 UTC

Red Hat OpenShift Enterprise 1.2 is now in Production 1 Phase of the support
and maintenance life cycle. This has been rated as having Moderate security
impact and is not currently planned to be addressed in future updates. For
additional information, refer to the Red Hat OpenShift Enterprise Life Cycle:

Note You need to log in before you can comment on or make changes to this bug.