brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability.
This vulnerability can be exploited by users able to control the Brakeman post-build step input data.\n\nbrakeman Plugin 0.13 escape affected values from the parsed file as they are recorded.
This fix is only applied to newly recorded data after a fixed version of the plugin is installed; historical data may still contain unsafe values.
{ "nvd_published_at": "2020-02-12T15:15:00Z", "github_reviewed_at": "2023-01-14T05:27:43Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-79" ] }