CVE-2024-32463

HIGH

phlex <1.10.1-1.6.3 - XSS

Title source: llm
STIX 2.1

Description

phlex is an open source framework for building object-oriented views in Ruby. There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data. The filter to detect and prevent the use of the `javascript:` URL scheme in the `href` attribute of an `<a>` tag could be bypassed with tab `\t` or newline `\n` characters between the characters of the protocol, e.g. `java\tscript:`. This vulnerability is fixed in 1.10.1, 1.9.2, 1.8.3, 1.7.2, 1.6.3, 1.5.3, and 1.4.2. Configuring a Content Security Policy that does not allow `unsafe-inline` would effectively prevent this vulnerability from being exploited.

Scores

CVSS v3 7.1
EPSS 0.0018
EPSS Percentile 39.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (8)
phlex-ruby/phlex >= 1.10.0, < 1.10.1
phlex-ruby/phlex >= 1.4.0, < 1.4.2
phlex-ruby/phlex >= 1.5.0, < 1.5.3
phlex-ruby/phlex >= 1.6.0, < 1.6.3
phlex-ruby/phlex >= 1.7.0, < 1.7.2
phlex-ruby/phlex >= 1.8.0, < 1.8.3
phlex-ruby/phlex >= 1.9.0, < 1.9.2
rubygems/phlex 1.10.0 - 1.10.1RubyGems
Published Apr 17, 2024
Tracked Since Feb 18, 2026