VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.31.2 and 2.49.1 have been released and fully mitigate the vulnerability. As a workaround, avoid passing user input to the `translate` function, or sanitize the inputs before passing them.
References
Link | Resource |
---|---|
https://github.com/github/view_component/releases/tag/v2.31.2 | Third Party Advisory |
https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf | Third Party Advisory |
https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9 | Patch Third Party Advisory |
https://github.com/github/view_component/releases/tag/v2.49.1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-02 15:15
Updated : 2022-03-10 07:32
NVD link : CVE-2022-24722
Mitre link : CVE-2022-24722
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
github
- viewcomponent