製品・ソフトウェアに関する情報
viewcomponent の Ruby 用 view component におけるクロスサイトスクリプティングの脆弱性
Title viewcomponent の Ruby 用 view component におけるクロスサイトスクリプティングの脆弱性
Summary

viewcomponent の Ruby 用 view component には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。

Publication Date Jan. 4, 2024, midnight
Registration Date Feb. 2, 2024, 4:29 p.m.
Last Update Feb. 2, 2024, 4:29 p.m.
CVSS3.0 : 警告
Score 6.1
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected System
viewcomponent
view component 2.83.0 未満
view component 3.0.0 以上 3.9.0 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2024年02月01日]   掲載 Feb. 1, 2024, 11:30 a.m.

NVD Vulnerability Information
CVE-2024-21636
Summary

view_component is a framework for building reusable, testable, and encapsulated view components in Ruby on Rails. Versions prior to 3.9.0 and 2.83.0 have a cross-site scripting vulnerability that has the potential to impact anyone rendering a component directly from a controller with the view_component gem. Note that only components that define a `#call` method (i.e. instead of using a sidecar template) are affected. The return value of the `#call` method is not sanitized and can include user-defined content. In addition, the return value of the `#output_postamble` methodis not sanitized, which can also lead to cross-site scripting issues. Versions 3.9.0 and 2.83.0 have been released and fully mitigate both the `#call` and the `#output_postamble` vulnerabilities. As a workaround, sanitize the return value of `#call`.

Publication Date Jan. 5, 2024, 5:15 a.m.
Registration Date Jan. 5, 2024, 10 a.m.
Last Update Jan. 11, 2024, 12:45 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:viewcomponent:view_component:*:*:*:*:*:ruby:*:* 3.0.0 3.9.0
cpe:2.3:a:viewcomponent:view_component:*:*:*:*:*:ruby:*:* 2.83.0
Related information, measures and tools
Common Vulnerabilities List