{"id":"UBUNTU-CVE-2020-11082","details":"In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.","modified":"2025-10-24T04:48:24Z","published":"2020-05-28T21:15:00Z","upstream":["CVE-2020-11082"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11082"},{"type":"REPORT","url":"https://github.com/github/advisory-review/pull/1020"},{"type":"REPORT","url":"https://github.com/kaminari/kaminari/commit/8dd52a1aed3d2fa2835d836de23fc0d8c4ff5db8"},{"type":"REPORT","url":"https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2020-11082"}],"affected":[{"package":{"name":"ruby-kaminari","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/ruby-kaminari@0.16.3-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.16.3-1"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-kaminari","binary_version":"0.16.3-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-11082.json"}},{"package":{"name":"ruby-kaminari","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ruby-kaminari@0.17.0-3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.17.0-3"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-kaminari","binary_version":"0.17.0-3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-11082.json"}},{"package":{"name":"ruby-kaminari","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby-kaminari@1.0.1-5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.0.1-4","1.0.1-5"],"ecosystem_specific":{"binaries":[{"binary_name":"ruby-kaminari","binary_version":"1.0.1-5"},{"binary_name":"ruby-kaminari-actionview","binary_version":"1.0.1-5"},{"binary_name":"ruby-kaminari-activerecord","binary_version":"1.0.1-5"},{"binary_name":"ruby-kaminari-core","binary_version":"1.0.1-5"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-11082.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}