-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3302
      FreeBSD - Ruby - Multiple jQuery vulnerabilities in RDoc [XSS]
                              30 August 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Ruby
Publisher:         FreeBSD
Operating System:  FreeBSD
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-9251 CVE-2012-6708 

Reference:         ESB-2019.3260
                   ESB-2019.1299

Original Bulletin: 
   http://www.vuxml.org/freebsd/ed8d5535-ca78-11e9-980b-999ff59c22ea.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than FreeBSD. It is recommended that administrators
         running Ruby check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

RDoc -- multiple jQuery vulnerabilities

link: 

FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports
Collection

RDoc -- multiple jQuery vulnerabilities

Affected packages
2.4.0 <= ruby         < 2.4.7,1
2.5.0 <= ruby         < 2.5.6,1
2.6.0 <= ruby         < 2.6.3,1
         rubygem-rdoc < 6.1.2

Details

VuXML ID  ed8d5535-ca78-11e9-980b-999ff59c22ea
Discovery 2019-08-28
Entry     2019-08-29

Ruby news:

    There are multiple vulnerabilities about Cross-Site Scripting (XSS) in
    jQuery shipped with RDoc which bundled in Ruby. All Ruby users are
    recommended to update Ruby to the latest release which includes the fixed
    version of RDoc.

    The following vulnerabilities have been reported.

    CVE-2012-6708

    CVE-2015-9251

    [source]

References

CVE     CVE-2012-6708
Name
CVE     CVE-2015-9251
Name
URL     https://www.ruby-lang.org/en/news/2019/08/28/
        multiple-jquery-vulnerabilities-in-rdoc/

???????????????????????????????????????????????????????????????????????????????

Copyright (C) 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright information.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXWia6maOgq3Tt24GAQggDhAAoPMn1n+LA2u3DAFTpagveWTKVII/MCtU
EzaTvAw7yJJfT+CmCAZredLzc8a2H/SEzWj1zX67SpNEUZUU6gSWke58apgeli75
UHJh+EPycfpCmQK6LqoSu3pWnHsF+bRLk4hyvs9HtG9ptd+lpsFVmk7iE8+NEQj8
DDF/HqiRNYcIB2JFByI/o0KSqBPt+2SiVHs3rRky3HH9bt1wu0XzkDAX7fumzxXX
k4mcSISCwkEF2uztKY/+nRNlGPuQBVIGTNcYx/lsfSOMQDVXNCwndyQA4Y58n5Ja
Qcpp0OQRMIVrTZumuuIXVFDgPkrjpcsDUZik+vMLtnc5YqKCi4KmFP+KDdAiYn7R
6jC5YOVPvJ8QtR6tDgXW9tihsdtNnDJlKhybCJ+nMT/bu6zWZikgSUJ03XaNmIFz
RLpxtuaBMz4HodLJWiAHyW7Jc1DxRDlOIFEAk2+eRjSTU8ffV5uIzOOJ4QnT2FB5
aUn119BOWXoWx3V4Y5VomqHZcftlAJkDNR7SRlvzW/Ss4TwMzrgFjLUa2EJtwfXk
m2P4813emBuckto0LAXAqg/+ic3uM3Z+TYXWksZMpdMb1RkHrQvqQc06Ok4n2g0v
MXXF0cSrcRpQgWeTmrFTkJ0hPQTs7ygmdMhhI1V4QL3PrPNpD4IkMDUQ5udMH6Mw
gnghfDKqz7s=
=o7KK
-----END PGP SIGNATURE-----