Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 14 Feb 2014 10:05:12 -0800
From: Tom Dale <tom@...dale.net>
To: oss-security@...ts.openwall.com
Subject: [CVE-2014-0046] XSS Vulnerability With {{link-to}} Helper in
 Non-block Form

XSS Vulnerability With {{link-to}} Helper in Non-block Form

There is a vulnerability in the {{link-to}} helper in Ember.js. This
vulnerability
has been assigned CVE-2014-0046.

Versions Affected: 1.2.0, 1.2.1, 1.3.0, 1.3.1
Not affected: Versions prior to 1.2
Fixed Versions: 1.2.2, 1.3.2

Impact
-------

In general, Ember.js escapes or strips any user-supplied content before
inserting it in strings that will be sent to innerHTML.  However, a change
made
to the implementation of the {{link-to}} helper means that any user-supplied
data bound to the {{link-to}} helper's title attribute will not be escaped
correctly.

In applications that use the {{link-to}} helper in non-block form and bind
the title attribute to user-supplied content, a specially-crafted payload
could execute arbitrary JavaScript in the context of the current domain
("XSS").

All users running an affected release and binding user-supplied data to the
{{link-to}} helper's title attribute should either upgrade or use one of the
workarounds immediately.

Releases
--------

Releases are available on emberjs.com/builds/#/tagged

Workarounds
-----------

Ensure that you escape any user-supplied value that you bind to the
{{link-to}}
helper's title attribute. For example, if you bind a value named userTitle:

 {{link-to "user" title=userTitle}}

Ensure that you escape the value of userTitle using
Ember.Handlebars.Utils.escapeExpression:

 var userTitle = this.get('userTitle');
 var safeUserTitle = Ember.Handlebars.Utils.escapeExpression(userTitle);
 this.set('userTitle', safeUserTitle);

Patches
-------

Patches are available as an attachment to the announcement on the
emberjs-security list:

https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ

Credits
-------

This vulnerability was reported to us by Hyder Ali of Zoho. Many thanks for
working with us on the patches and advisory.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ