rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4.
References
Link | Resource |
---|---|
https://github.com/rails/rails-html-sanitizer/issues/135 | Exploit Issue Tracking Third Party Advisory |
https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m | Third Party Advisory |
https://hackerone.com/reports/1694173 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-12-14 17:15
Updated : 2024-02-01 16:06
NVD link : CVE-2022-23518
Mitre link : CVE-2022-23518
CVE.ORG link : CVE-2022-23518
JSON object : View
Products Affected
debian
- debian_linux
rubyonrails
- rails_html_sanitizers
loofah_project
- loofah
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')