You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
With a bit of experimentation, I discovered that adding &script_name=https://www.example.com to a page with will_paginate links would result in the links being rewritten to be https://www.example.com... instead of the intended site. I guess someone could use this in a social engineering attack by sending someone a link with &script_name being a malicious site and hoping they click on the pagination links and getting fooled, but I'm not sure if it's any worse than that.
Apparently there was a security issue fixed here: mislav/will_paginate@ec9b985 and here: mislav/will_paginate@ab55687
It looks like versions before 3.1.2, 3.0.9, and are vulnerable, but this has no CVE and I'm not sure exactly what the vulnerability was.
The text was updated successfully, but these errors were encountered: