Skip to content

Reflected XSS in resque-web failed and queues lists

Moderate
PatrickTulskie published GHSA-gc3j-vvwf-4rp8 Dec 18, 2023

Package

bundler resque (RubyGems)

Affected versions

< 2.2.1

Patched versions

2.2.1

Description

Impact

The following paths in resque-web have been found to be vulnerable to reflected XSS:

/failed/?class=<script>alert(document.cookie)</script>
/queues/><img src=a onerror=alert(document.cookie)>

Patches

v2.2.1

Workarounds

No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.

References

#1790

Severity

Moderate
6.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

CVE ID

CVE-2023-50725

Weaknesses

Credits