Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rails
  4. ›
  5. CVE-2014-0081

CVE-2014-0081: XSS Vulnerability in number_to_currency, number_to_percentage and number_to_human

February 20, 2014 (updated August 8, 2019)

There is an XSS vulnerability in the number_to_currency, number_to_percentage and number_to_human helpers in Ruby on Rails. These helpers allow users to nicely format a numeric value. Some helper parameters (format, negative_format and units) are not escaped correctly. Applications which pass user controlled data as one of these parameters are vulnerable to an XSS attack. All users passing user controlled data to these parameters of the number helpers should either upgrade or use one of the workarounds immediately.

References

  • groups.google.com/forum/

Code Behaviors & Features

Detect and mitigate CVE-2014-0081 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.2.17, all versions starting from 4.0.0.beta before 4.0.3, version 4.1.0.beta1

Fixed versions

  • 3.2.17
  • 4.0.3
  • 4.1.0.beta2

Solution

To aid users who aren't able to upgrade immediately patches are available for the two supported release series. They are in git-am format and consist of a single changeset. * 4-1-beta-number_helpers_xss.patch - Patch for 4.1-beta series * 4-0-number_helpers_xss.patch - Patch for 4.0 series * 3-2-number_helpers_xss.patch - Patch for 3.2 series

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

gem/rails/CVE-2014-0081.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:54 +0000.