CVE-2017-12098
Description
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
rails_admin gem 1.2.0 has a stored/reflected XSS in the add filter functionality, allowing an attacker to execute arbitrary JavaScript in an authenticated admin's browser via a crafted URL.
Vulnerability
The rails_admin Rails gem version 1.2.0 contains an exploitable cross-site scripting (XSS) vulnerability in the add filter functionality. When a user creates a custom filter through the admin interface, the application generates a URL containing unfiltered user input. A specially crafted URL can inject arbitrary JavaScript into the admin page. This affects the rails_admin gem versions up to and including 1.2.0 as reported by Cisco Talos [1][2][4].
Exploitation
An attacker can craft a malicious URL containing the XSS payload (e.g., by appending a crafted f[] parameter with JavaScript). The attacker then phishes an authenticated admin user into visiting this URL in their browser. No special network position or authentication is required for the attacker beyond the ability to deliver the link. The vulnerability triggers upon page load in the browser, and was confirmed to work in Chrome, Safari, and Firefox [4].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's authenticated admin session. This can lead to data theft, session hijacking, or unauthorized administrative actions, resulting in partial loss of confidentiality and integrity of the application [1].
Mitigation
As of the available references, a fix for this specific vulnerability in rails_admin 1.2.0 was not explicitly outlined in the disclosure timeline. Users should upgrade to a later version of the rails_admin gem that addresses CVE-2017-12098. If no patched version is available, consider using a Web Application Firewall (WAF) to filter malicious query parameters, restrict the add_filter functionality to trusted users, and sanitize user input in filter parameters. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of this writing.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rails_adminRubyGems | < 1.3.0 | 1.3.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-pxr8-w3jq-rcwjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2017-12098ghsaADVISORY
- www.securityfocus.com/bid/102486mitrevdb-entryx_refsource_BID
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2017-12098.ymlghsaWEB
- web.archive.org/web/20210116160904/http://www.securityfocus.com/bid/102486ghsaWEB
- www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.