VYPR
Moderate severityGHSA Advisory· Published Jun 30, 2022· Updated Aug 6, 2024

CVE-2013-4170

CVE-2013-4170

Description

In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the tagName property of an Ember.View was inserted into such a string without being sanitized. This means that if an application assigns a view's tagName to user-supplied data, a specially-crafted payload could execute arbitrary JavaScript in the context of the current domain ("XSS"). This vulnerability only affects applications that assign or bind user-provided content to tagName.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ember-sourceRubyGems
< 1.0.0.rc1.11.0.0.rc1.1
ember-sourceRubyGems
>= 1.0.0.rc2.0, < 1.0.0.rc2.11.0.0.rc2.1
ember-sourceRubyGems
>= 1.0.0.rc3.0, < 1.0.0.rc3.11.0.0.rc3.1
ember-sourceRubyGems
>= 1.0.0.rc4.0, < 1.0.0.rc4.11.0.0.rc4.1
ember-sourceRubyGems
>= 1.0.0.rc5.0, < 1.0.0.rc5.11.0.0.rc5.1
ember-sourceRubyGems
>= 1.0.0.rc6.0, < 1.0.0.rc6.11.0.0.rc6.1

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.