Skip to content

Access Control: Ruby on Rails - CRLF Injection and Cross-Site Scripting

Identifier: rails6_xss

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner

Description

Ruby on Rails 6.0.0-6.0.3.1 contains a CRLF issue which allows JavaScript to be injected into the response, resulting in cross-site scripting.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  rails6_xss:
    assets_allowed:
    - REST
    - GRAPHQL
    - WEBAPP
    skip: false

Reference

assets_allowed

Type : List[AssetType]*

List of assets that this check will cover.

skip

Type : boolean

Skip the test if true.