{"id":"UBUNTU-CVE-2015-3226","details":"Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.","modified":"2025-07-16T07:17:31.223219Z","published":"2015-07-26T22:59:00Z","withdrawn":"2025-07-18T16:43:12Z","upstream":["CVE-2015-3226"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3226"},{"type":"REPORT","url":"https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-3226"}],"affected":[{"package":{"name":"rails","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/rails@2:4.2.5-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.2.5-1"}]}],"versions":["2:4.1.10-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"rails","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-actionmailer","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-actionpack","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-actionview","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-activejob","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-activemodel","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-activerecord","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-activesupport","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-rails","binary_version":"2:4.2.5-1"},{"binary_name":"ruby-railties","binary_version":"2:4.2.5-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3226.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}