CVE-2017-1002201
Published: 15 October 2019
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
From the Ubuntu Security Team
It was discovered that Haml did not properly escape the ' character. If Haml were made to process crafted data, an attacker could execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
ruby-haml Launchpad, Ubuntu, Debian |
bionic |
Needed
|
disco |
Not vulnerable
(5.0.4-3)
|
|
eoan |
Not vulnerable
(5.0.4-3)
|
|
focal |
Not vulnerable
(5.0.4-3)
|
|
upstream |
Released
(5.0.4-1)
|
|
groovy |
Not vulnerable
(5.0.4-3)
|
|
xenial |
Needed
|
|
kinetic |
Not vulnerable
(5.0.4-3)
|
|
trusty |
Released
(4.0.5-2+deb8u1build0.14.04.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
hirsute |
Not vulnerable
(5.0.4-3)
|
|
impish |
Not vulnerable
(5.0.4-3)
|
|
jammy |
Not vulnerable
(5.0.4-3)
|
|
lunar |
Not vulnerable
(5.0.4-3)
|
|
mantic |
Not vulnerable
(5.0.4-3)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |