We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.
path: /var/lib/gems/2.3.0/cache/sinatra-1.4.8.gem
Library home page: https://rubygems.org/gems/sinatra-1.4.8.gem
Dependency Hierarchy:
Found in HEAD commit: b3959e9cf7e18549f4a5e974ecb62239f3b8eaf2
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
Publish Date: 2018-05-31
URL: CVE-2018-11627
Base Score Metrics:
Type: Change files
Origin: sinatra/sinatra@1278686
Release Date: 2018-05-30
Fix Resolution: Replace or update the following file: base.rb
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered:
Not an issue.
Sorry, something went wrong.
vladzima
No branches or pull requests
CVE-2018-11627 - Medium Severity Vulnerability
Vulnerable Library - sinatra-1.4.8.gem
Sinatra is a DSL for quickly creating web applications in Ruby with minimal effort.
path: /var/lib/gems/2.3.0/cache/sinatra-1.4.8.gem
Library home page: https://rubygems.org/gems/sinatra-1.4.8.gem
Dependency Hierarchy:
Found in HEAD commit: b3959e9cf7e18549f4a5e974ecb62239f3b8eaf2
Vulnerability Details
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
Publish Date: 2018-05-31
URL: CVE-2018-11627
CVSS 3 Score Details (6.1)
Base Score Metrics:
Suggested Fix
Type: Change files
Origin: sinatra/sinatra@1278686
Release Date: 2018-05-30
Fix Resolution: Replace or update the following file: base.rb
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: