We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 76a499f commit bc3e9f0Copy full SHA for bc3e9f0
gems/sidekiq/CVE-2023-1892.yml
@@ -3,7 +3,7 @@ gem: sidekiq
3
cve: 2023-1892
4
ghsa: h3r8-h5qw-4r35
5
url: https://github.com/sidekiq/sidekiq/commit/458fdf74176a9881478c48dc5cf0269107b22214
6
-title: 'sidekiq vulnerable to cross-site scripting '
+title: sidekiq vulnerable to cross-site scripting
7
date: 2023-04-21
8
description: |
9
sidekiq from 7.0.4 to 7.0.7 is vulnerable to reflected cross-site scripting.
spec/advisory_example.rb
@@ -117,6 +117,10 @@
117
it "must be one line" do
118
expect(subject).to_not include("\n")
119
end
120
+
121
+ it "must not start with or end with additional whitespace" do
122
+ expect(subject).to_not match(/\A\s|\s\z/)
123
+ end
124
125
126
describe "date" do
0 commit comments