CVE-2022-44303

Published: Dic 13, 2022 Last Modified: Apr 22, 2025
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,1
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: low
Integrity: low
Availability: none

Description

AI Translation Available

Resque Scheduler version 1.27.4 is vulnerable to Cross-site scripting (XSS). A remote attacker could inject javascript code to the '{schedule_job}' or 'args' parameter in /resque/delayed/jobs/{schedule_job}?args={args_id} to execute javascript at client side.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0028
Percentile
0,5th
Updated

EPSS Score Trend (Last 90 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
Application

Resque-Scheduler by Resque-Scheduler Project

cpe:2.3:a:resque-scheduler_project:resque-scheduler:-:*:*:*:*:ruby:*:*
Common Platform Enumeration - Standardized vulnerability identification
http://resque.com
Broken Link Not Applicable
http://resque.com
https://trungvm.gitbook.io/cves/resque/resque-1.27.4-multiple-reflected-xss-in-…
http://resque.com
Broken Link Not Applicable
http://resque.com
https://trungvm.gitbook.io/cves/resque/resque-1.27.4-multiple-reflected-xss-in-…