Haml vulnerable to cross-site scripting
Moderate severity
GitHub Reviewed
Published
Oct 21, 2019
to the GitHub Advisory Database
•
Updated Aug 25, 2023
Description
Published by the National Vulnerability Database
Oct 15, 2019
Reviewed
Oct 16, 2019
Published to the GitHub Advisory Database
Oct 21, 2019
Last updated
Aug 25, 2023
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like
< > " '
must be escaped properly. In this case, the'
character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.References