Headline
GHSA-r9mq-m72x-257g: Resque vulnerable to reflected XSS in Queue Endpoint
Impact
Reflected XSS can be performed using the current_queue portion of the path on the /queues endpoint of resque-web.
Patches
v2.6.0
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
https://github.com/resque/resque/pull/1865
Skip to content
Sign in
CVE-2023-50727
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
* All features
* Documentation
* GitHub Skills
* Blog
For
- Enterprise
- Teams
- Startups
- Education
By Solution
- CI/CD & Automation
- DevOps
- DevSecOps
Resources
- Learning Pathways
- White papers, Ebooks, Webinars
- Customer Stories
- Partners
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Repositories
* Topics
* Trending
* Collections
- Pricing
Search code, repositories, users, issues, pull requests…
Provide feedback
We read every piece of feedback, and take your input very seriously.
Include my email address so I can be contacted
Saved searches****Use saved searches to filter your results more quickly
Sign in
Sign up
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2023-50727
Resque vulnerable to reflected XSS in Queue Endpoint
Moderate severity GitHub Reviewed Published Dec 18, 2023 in resque/resque
Vulnerability details Dependabot alerts 0
Package
bundler resque (RubyGems)
Affected versions
< 2.6.0
Patched versions
2.6.0
Description
Impact
Reflected XSS can be performed using the current_queue portion of the path on the /queues endpoint of resque-web.
Patches
v2.6.0
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
resque/resque#1865
References
- GHSA-r9mq-m72x-257g
- resque/resque#1865
- resque/resque@7623b8d
PatrickTulskie published to resque/resque
Dec 18, 2023
Published to the GitHub Advisory Database
Dec 18, 2023
Reviewed
Dec 18, 2023
Severity
Moderate
6.3
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N
Weaknesses
CWE-79 CWE-233
CVE ID
CVE-2023-50727
GHSA ID
GHSA-r9mq-m72x-257g
Source code
resque/resque
Credits
- priya-hinduja Remediation developer
- PatrickTulskie Coordinator
Checking history
See something to contribute? Suggest improvements for this vulnerability.