{"id":4316,"date":"2014-11-26T13:18:28","date_gmt":"2014-11-26T15:18:28","guid":{"rendered":"http:\/\/blog.plataformatec.com.br\/?p=4316"},"modified":"2015-06-01T12:28:45","modified_gmt":"2015-06-01T15:28:45","slug":"xss-vulnerability-on-simple-form-2","status":"publish","type":"post","link":"http:\/\/blog.plataformatec.com.br\/2014\/11\/xss-vulnerability-on-simple-form-2\/","title":{"rendered":"XSS vulnerability on Simple Form"},"content":{"rendered":"
There is a XSS vulnerability on Simple Form’s error options.<\/p>\n
When Simple Form renders an error message it marks the text as being HTML safe, even though it may contain HTML tags. In applications where the error message can be provided by the users, malicious values can be provided and Simple Form will mark them as safe.<\/p>\n
To fix this vulnerability error messages are now always escaped. If users need to mark them as safe they will need to use explicitly the The 3.1.0, 3.0.3 and 2.1.2 releases are available at the regular locations.<\/p>\n There are no feasible workarounds for this issue. We recommend all users to upgrade as soon as possible.<\/p>\n To aid users who aren’t able to upgrade immediately we have provided patches. They are in git-am format and consist of a single changeset.<\/p>\n Thanks to Jake Goulding, from WhiteHat Security and Nicholas Rutherford from Medify Ltd. for reporting the issue and working with us in a fix.<\/p>\n There is a XSS vulnerability on Simple Form’s error options. Versions affected: >= 2.0.0 Not affected: < 2.0.0 Fixed versions: 3.1.0, 3.0.3, 2.1.2 Impact When Simple Form renders an error message it marks the text as being HTML safe, even though it may contain HTML tags. In applications where the error message can be provided … \u00bb<\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[92,124,198],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/posts\/4316"}],"collection":[{"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/comments?post=4316"}],"version-history":[{"count":12,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/posts\/4316\/revisions"}],"predecessor-version":[{"id":4722,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/posts\/4316\/revisions\/4722"}],"wp:attachment":[{"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/media?parent=4316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/categories?post=4316"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.plataformatec.com.br\/wp-json\/wp\/v2\/tags?post=4316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}:error<\/code> option:<\/p>\n
f.input :name, error: raw(\"My <b>error<\/b>\")\n<\/code><\/pre>\n
Releases<\/h2>\n
Workarounds<\/h2>\n
Patches<\/h2>\n
\n
Credits<\/h2>\n