An exploitable XSS vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim’s browser. An attacker can phish an authenticated user to trigger this vulnerability.
The delayed_job_web gem allows users to filter output based on the query string of the GET request. This looks similar to.
from https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0449
An exploitable XSS vulnerability exists in the filter functionality of the delayed_job_web rails gem version 1.4. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim’s browser. An attacker can phish an authenticated user to trigger this vulnerability.
The delayed_job_web gem allows users to filter output based on the query string of the GET request. This looks similar to.
localhost:3000/delayed_job/overview?queues=">+ Githubissues.