Vulnerabilities > CVE-2023-50725 - Unspecified vulnerability in Resque
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
LOW Availability impact
NONE Summary
Resque is a Redis-backed Ruby library for creating background jobs, placing them on multiple queues, and processing them later. The following paths in resque-web have been found to be vulnerable to reflected XSS: "/failed/?class=<script>alert(document.cookie)</script>" and "/queues/><img src=a onerror=alert(document.cookie)>". This issue has been patched in version 2.2.1.
Vulnerable Configurations
References
- https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07
- https://github.com/resque/resque/commit/ee99d2ed6cc75d9d384483b70c2d96d312115f07
- https://github.com/resque/resque/pull/1790
- https://github.com/resque/resque/pull/1790
- https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8
- https://github.com/resque/resque/security/advisories/GHSA-gc3j-vvwf-4rp8
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50725.yml
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/resque/CVE-2023-50725.yml