CVE-2018-16471

Priority
Description
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11.
Carefully crafted requests can impact the data returned by the `scheme`
method on `Rack::Request`. Applications that expect the scheme to be
limited to 'http' or 'https' and do not escape the return value could be
vulnerable to an XSS attack. Note that applications using the normal
escaping mechanisms provided by Rails may not impacted, but applications
that bypass the escaping mechanisms, or do not use them may be vulnerable.
Ubuntu-Description
It was discovered that Rack incorrectly handled carefully crafted requests. A
remote attacker could use this issue to execute a cross-site scripting (XSS)
attack.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.6.4-3ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.6.4-4ubuntu0.1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (2.0.6-3)
Ubuntu 20.10 (Groovy Gorilla):not-affected (2.0.6-3)
More Information

Updated: 2020-09-09 21:58:25 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)