Resque vulnerable to Reflected Cross Site Scripting through pathnames
Description
Published to the GitHub Advisory Database
Dec 18, 2023
Reviewed
Dec 18, 2023
Published by the National Vulnerability Database
Dec 21, 2023
Last updated
Jan 19, 2024
Impact
resque-web in resque versions before 2.1.0 is vulnerable to reflected XSS through the current_queue parameter in the path of the queues endpoint.
Patches
v2.1.0
Workarounds
No known workarounds at this time. It is recommended to not click on 3rd party or untrusted links to the resque-web interface until you have patched your application.
References
resque/resque#1679
resque/resque#1687
References