We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboard that includes a data-method, data-remote or data-disable-with attribute.
Reserved 2023-01-19 | Published 2025-01-09 | Updated 2025-01-09 | Assigner hackeronebugs.debian.org/cgi-bin/bugreport.cgi?bug=1033263
discuss.rubyonrails.org/...ntenteditable-html-elements/82468
github.com/...ommit/5037a13614d71727af8a175063bcf6ba1a74bdbd
security.netapp.com/advisory/ntap-20240605-0007/
www.debian.org/security/2023/dsa-5389
Support options