Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML.
This vulnerability could allow an attacker to execute cross-site scripting (XSS) attacks by injecting malicious HTML/JavaScript into the application. Such attacks could lead to theft of sensitive data, session hijacking, and other impacts depending on the context.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
This vulnerability is patched in Rails versions 7.1.3.4 and 7.2.0.beta2. Applications using vulnerable versions of Rails should update to these patched versions.
As a mitigation, ensure that all user input is properly sanitized and validated before rendering it in HTML pages. Implement content security policies, input validation, output encoding, and other defense-in-depth measures against XSS attacks.
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Feedly found the first article mentioning CVE-2024-32464. See article
NVD published the first details for CVE-2024-32464
Feedly estimated the CVSS score as MEDIUM
A CVSS base score of 6.1 has been assigned.
This CVE started to trend in security discussions
EPSS Score was set to: 0.04% (Percentile: 8.8%)
This CVE stopped trending in security discussions