haml是Haml团队的一款开源的HTML抽象标记语言。
haml 5.0.0.beta.2之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2
来源:CONFIRM
链接:https://snyk.io/vuln/SNYK-RUBY-HAML-20362
来源:GENTOO
链接:https://security.gentoo.org/glsa/202007-27
来源:github.com
链接:https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html
来源:www.debian.org
链接:https://www.debian.org/lts/security/2019/dla-1986
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192932-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20193270-1.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158593/Gentoo-Linux-Security-Advisory-202007-27.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4224/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0902/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4229/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2017-1002201
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4642/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/haml-code-execution-via-Special-Characters-30824