VYPR
Moderate severityNVD Advisory· Published Jan 19, 2018· Updated Aug 5, 2024

CVE-2017-12098

CVE-2017-12098

Description

An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

rails_admin gem 1.2.0 has a stored/reflected XSS in the add filter functionality, allowing an attacker to execute arbitrary JavaScript in an authenticated admin's browser via a crafted URL.

Vulnerability

The rails_admin Rails gem version 1.2.0 contains an exploitable cross-site scripting (XSS) vulnerability in the add filter functionality. When a user creates a custom filter through the admin interface, the application generates a URL containing unfiltered user input. A specially crafted URL can inject arbitrary JavaScript into the admin page. This affects the rails_admin gem versions up to and including 1.2.0 as reported by Cisco Talos [1][2][4].

Exploitation

An attacker can craft a malicious URL containing the XSS payload (e.g., by appending a crafted f[] parameter with JavaScript). The attacker then phishes an authenticated admin user into visiting this URL in their browser. No special network position or authentication is required for the attacker beyond the ability to deliver the link. The vulnerability triggers upon page load in the browser, and was confirmed to work in Chrome, Safari, and Firefox [4].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's authenticated admin session. This can lead to data theft, session hijacking, or unauthorized administrative actions, resulting in partial loss of confidentiality and integrity of the application [1].

Mitigation

As of the available references, a fix for this specific vulnerability in rails_admin 1.2.0 was not explicitly outlined in the disclosure timeline. Users should upgrade to a later version of the rails_admin gem that addresses CVE-2017-12098. If no patched version is available, consider using a Web Application Firewall (WAF) to filter malicious query parameters, restrict the add_filter functionality to trusted users, and sanitize user input in filter parameters. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of this writing.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
rails_adminRubyGems
< 1.3.01.3.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.