5
CVE-2015-1840
- EPSS 0.32%
- Published 26.07.2015 22:59:00
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
Data is provided by the National Vulnerability Database (NVD)
Fedoraproject ≫ Fedora Version21
Fedoraproject ≫ Fedora Version22
Rubyonrails ≫ Jquery-rails Version <= 3.1.2
Rubyonrails ≫ Jquery-rails Version4.0.0
Rubyonrails ≫ Jquery-rails Version4.0.1
Rubyonrails ≫ Jquery-ujs Version <= 1.0.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.32% | 0.548 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.