We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 8cecd50 commit 5b0b90eCopy full SHA for 5b0b90e
1 file changed
gems/easymon/CVE-2018-1000855.yml
@@ -0,0 +1,16 @@
1
+---
2
+gem: easymon
3
+date: 2018-11-09
4
+url: https://github.com/basecamp/easymon/issues/26
5
+cve: 2018-1000855
6
+title: Reflected XSS in Firefox in check endpoint
7
+description: |
8
+ When passing an invalid check name as parameter to the endpoint where
9
+ the easymon routes are mounted, a 406 response with a body that contains the invalid
10
+ check name unescaped is returned. Malicious JavaScript can be injected into that
11
+ invalid name and have it executed in Firefox
12
+patched_versions:
13
+ - ">= 1.4.1"
14
+related:
15
+ url:
16
+ - https://github.com/basecamp/easymon/pull/25
0 commit comments