CVE-2018-16471

Priority
Description
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11.
Carefully crafted requests can impact the data returned by the `scheme`
method on `Rack::Request`. Applications that expect the scheme to be
limited to 'http' or 'https' and do not escape the return value could be
vulnerable to an XSS attack. Note that applications using the normal
escaping mechanisms provided by Rails may not impacted, but applications
that bypass the escaping mechanisms, or do not use them may be vulnerable.
Ubuntu-Description
It was discovered that Rack incorrectly handled carefully crafted requests. A
remote attacker could use this issue to execute a cross-site scripting (XSS)
attack.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (1.6.4-3ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (1.6.4-4ubuntu0.1)
Ubuntu 19.04 (Disco Dingo):not-affected (2.0.6-3)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.0.6-3)
Ubuntu 20.04 (Focal Fossa):not-affected (2.0.6-3)
More Information

Updated: 2019-12-05 19:54:21 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)