We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7b0b924 commit d6dd0d9Copy full SHA for d6dd0d9
gems/chartkick/CVE-2019-12732.yml
@@ -0,0 +1,21 @@
1
+---
2
+gem: chartkick
3
+cve: 2019-12732
4
+url: https://github.com/ankane/chartkick/issues/488
5
+title: XSS Vulnerability in Chartkick Ruby Gem
6
+date: 2019-06-04
7
+description: |
8
+ Chartkick is vulnerable to a cross-site scripting (XSS) attack if
9
+ both the following conditions are met:
10
+
11
+ Condition 1:
12
+ It's used with `ActiveSupport.escape_html_entities_in_json = false`
13
+ (this is not the default for Rails)
14
+ OR used with a non-Rails framework like Sinatra.
15
16
+ Condition 2:
17
+ Untrusted data or options are passed to a chart.
18
19
+ <%= line_chart params[:data], min: params[:min] %>
20
+patched_versions:
21
+ - ">= 3.2.0"
0 commit comments