Bug 2255888 (CVE-2023-50725) - CVE-2023-50725 resque: Reflected XSS in resque-web failed and queues lists
Summary: CVE-2023-50725 resque: Reflected XSS in resque-web failed and queues lists
Keywords:
Status: NEW
Alias: CVE-2023-50725
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2255889
TreeView+ depends on / blocked
 
Reported: 2023-12-26 07:15 UTC by TEJ RATHI
Modified: 2024-06-10 18:04 UTC (History)
4 users (show)

Fixed In Version: resque 2.2.1
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2023-12-26 07:15:26 UTC
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.

https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07
https://github.com/resque/resque/pull/1790
https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50725.yml


Note You need to log in before you can comment on or make changes to this bug.