In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-10-15 18:15
Updated : 2021-12-29 15:15
NVD link : CVE-2017-1002201
Mitre link : CVE-2017-1002201
JSON object : View
Products Affected
haml
- haml
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
