CVE-2020-25739Cross-site Scripting in Project GON

Severity
6.1MEDIUMNVD
EPSS
0.8%
top 26.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 23
Latest updateApr 30

Description

An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages1 packages

NVDgon_project/gon< 6.4.0

Also affects: Debian Linux 9.0, Ubuntu Linux 18.04

Patches

🔴Vulnerability Details

4
OSV
Gon gem lack of escaping certain input when outputting as JSON2021-04-30
GHSA
Gon gem lack of escaping certain input when outputting as JSON2021-04-30
CVEList
CVE-2020-25739: An issue was discovered in the gon gem before gon-62020-09-23
OSV
CVE-2020-25739: An issue was discovered in the gon gem before gon-62020-09-23

📋Vendor Advisories

2
Ubuntu
Gon gem vulnerability2020-09-30
Debian
CVE-2020-25739: ruby-gon - An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does...2020
CVE-2020-25739 — Cross-site Scripting in Project GON | cvebase