Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-r9mq-m72x-257g: Resque vulnerable to reflected XSS in Queue Endpoint

Impact

Reflected XSS can be performed using the current_queue portion of the path on the /queues endpoint of resque-web.

Patches

v2.6.0

Workarounds

No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.

References

https://github.com/resque/resque/pull/1865

ghsa
#xss#vulnerability#web#git#ruby

Skip to content

Sign in

CVE-2023-50727

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

Explore

*   All features
*   Documentation
*   GitHub Skills
*   Blog
  • For

    • Enterprise
    • Teams
    • Startups
    • Education

    By Solution

    • CI/CD & Automation
    • DevOps
    • DevSecOps

    Resources

    • Learning Pathways
    • White papers, Ebooks, Webinars
    • Customer Stories
    • Partners
    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

Repositories

*   Topics
*   Trending
*   Collections
  • Pricing

Search code, repositories, users, issues, pull requests…

Provide feedback

We read every piece of feedback, and take your input very seriously.

Include my email address so I can be contacted

Saved searches****Use saved searches to filter your results more quickly

Sign in

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2023-50727

Resque vulnerable to reflected XSS in Queue Endpoint

Moderate severity GitHub Reviewed Published Dec 18, 2023 in resque/resque

Vulnerability details Dependabot alerts 0

Package

bundler resque (RubyGems)

Affected versions

< 2.6.0

Patched versions

2.6.0

Description

Impact

Reflected XSS can be performed using the current_queue portion of the path on the /queues endpoint of resque-web.

Patches

v2.6.0

Workarounds

No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.

References

resque/resque#1865

References

  • GHSA-r9mq-m72x-257g
  • resque/resque#1865
  • resque/resque@7623b8d

PatrickTulskie published to resque/resque

Dec 18, 2023

Published to the GitHub Advisory Database

Dec 18, 2023

Reviewed

Dec 18, 2023

Severity

Moderate

6.3

/ 10

CVSS base metrics

Attack vector

Network

Attack complexity

Low

Privileges required

Low

User interaction

Required

Scope

Unchanged

Confidentiality

Low

Integrity

High

Availability

None

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N

Weaknesses

CWE-79 CWE-233

CVE ID

CVE-2023-50727

GHSA ID

GHSA-r9mq-m72x-257g

Source code

resque/resque

Credits

  • priya-hinduja Remediation developer
  • PatrickTulskie Coordinator

Checking history

See something to contribute? Suggest improvements for this vulnerability.

ghsa: Latest News

GHSA-pfr9-2p92-qrhq: Databento Binary Encoding (DBN) has a heap buffer overflow using c_chars_to_str function