{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2023 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2013-1855","title":"Title"},{"category":"description","text":"The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2013-1855","url":"https://www.suse.com/security/cve/CVE-2013-1855"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809935 for CVE-2013-1855","url":"https://bugzilla.suse.com/809935"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:1036-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-June/000483.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2013:0661-1","url":"https://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2013:0662-1","url":"https://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2014:0019-1","url":"https://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"}],"title":"SUSE CVE CVE-2013-1855","tracking":{"current_release_date":"2023-02-15T05:39:55Z","generator":{"date":"2023-02-15T05:39:55Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2013-1855","initial_release_date":"2023-02-15T05:39:55Z","revision_history":[{"date":"2023-02-15T05:39:55Z","number":"2","summary":"Current version"}],"status":"interim","version":"2"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_identification_helper":{"cpe":"cpe:/a:suse:sle-sdk:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_identification_helper":{"cpe":"cpe:/a:suse:sle-sdk:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_identification_helper":{"cpe":"cpe:/a:suse:sle-sdk:11:sp4"}}},{"category":"product_name","name":"SUSE Studio Onsite 1.3","product":{"name":"SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-studioonsite:1.3"}}},{"category":"product_version","name":"rubygem-actionpack-3_2-3.2.12-0.19.1","product":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1","product_id":"rubygem-actionpack-3_2-3.2.12-0.19.1"}},{"category":"product_version","name":"susestudio-1.3.1.0-0.5.2","product":{"name":"susestudio-1.3.1.0-0.5.2","product_id":"susestudio-1.3.1.0-0.5.2","product_identification_helper":{"cpe":"cpe:2.3:a:suse:studio_onsite:1.3.1.0:*:*:*:*:*:*:*"}}},{"category":"product_version","name":"susestudio-bundled-packages-1.3.1.0-0.5.2","product":{"name":"susestudio-bundled-packages-1.3.1.0-0.5.2","product_id":"susestudio-bundled-packages-1.3.1.0-0.5.2"}},{"category":"product_version","name":"susestudio-common-1.3.1.0-0.5.2","product":{"name":"susestudio-common-1.3.1.0-0.5.2","product_id":"susestudio-common-1.3.1.0-0.5.2"}},{"category":"product_version","name":"susestudio-runner-1.3.1.0-0.5.2","product":{"name":"susestudio-runner-1.3.1.0-0.5.2","product_id":"susestudio-runner-1.3.1.0-0.5.2"}},{"category":"product_version","name":"susestudio-sid-1.3.1.0-0.5.2","product":{"name":"susestudio-sid-1.3.1.0-0.5.2","product_id":"susestudio-sid-1.3.1.0-0.5.2"}},{"category":"product_version","name":"susestudio-ui-server-1.3.1.0-0.5.2","product":{"name":"susestudio-ui-server-1.3.1.0-0.5.2","product_id":"susestudio-ui-server-1.3.1.0-0.5.2"}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.19.1 as component of SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.19.1","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"susestudio-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-1.3.1.0-0.5.2"},"product_reference":"susestudio-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"susestudio-bundled-packages-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-bundled-packages-1.3.1.0-0.5.2"},"product_reference":"susestudio-bundled-packages-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"susestudio-common-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-common-1.3.1.0-0.5.2"},"product_reference":"susestudio-common-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"susestudio-runner-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-runner-1.3.1.0-0.5.2"},"product_reference":"susestudio-runner-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"susestudio-sid-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-sid-1.3.1.0-0.5.2"},"product_reference":"susestudio-sid-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"susestudio-ui-server-1.3.1.0-0.5.2 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:susestudio-ui-server-1.3.1.0-0.5.2"},"product_reference":"susestudio-ui-server-1.3.1.0-0.5.2","relates_to_product_reference":"SUSE Studio Onsite 1.3"}]},"vulnerabilities":[{"cve":"CVE-2013-1855","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2013-1855"}],"notes":[{"category":"general","text":"The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \\n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.","title":"Vulnerability description"}],"product_status":{"fixed":["SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Studio Onsite 1.3:susestudio-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-bundled-packages-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-common-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-runner-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-sid-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-ui-server-1.3.1.0-0.5.2"]},"references":[{"category":"external","summary":"CVE-2013-1855","url":"https://www.suse.com/security/cve/CVE-2013-1855"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 809935 for CVE-2013-1855","url":"https://bugzilla.suse.com/809935"},{"category":"external","summary":"Advisory link for SUSE-SU-2013:1036-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2013-June/000483.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2013:0661-1","url":"https://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2013:0662-1","url":"https://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2014:0019-1","url":"https://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.19.1","SUSE Studio Onsite 1.3:susestudio-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-bundled-packages-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-common-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-runner-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-sid-1.3.1.0-0.5.2","SUSE Studio Onsite 1.3:susestudio-ui-server-1.3.1.0-0.5.2"]}],"threats":[{"category":"impact","date":"2013-06-28T07:02:55Z","details":"moderate"}],"title":"CVE-2013-1855"}]}