Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mcvf-2q2m-x72m

Опубликовано: 13 дек. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

Improper neutralization of data URIs may allow XSS in rails-html-sanitizer

Summary

rails-html-sanitizer >= 1.0.3, < 1.4.4 is vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0.

Mitigation

Upgrade to rails-html-sanitizer >= 1.4.4.

Severity

The maintainers have evaluated this as Medium Severity 6.1.

References

Credit

This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).

Пакеты

Наименование

rails-html-sanitizer

rubygems
Затронутые версииВерсия исправления

>= 1.0.3, < 1.4.4

1.4.4

EPSS

Процентиль: 44%
0.00215
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 2 лет назад

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4.

CVSS3: 6.1
redhat
больше 2 лет назад

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4.

CVSS3: 6.1
nvd
больше 2 лет назад

rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4.

CVSS3: 6.1
debian
больше 2 лет назад

rails-html-sanitizer is responsible for sanitizing HTML fragments in R ...

CVSS3: 6.1
fstec
больше 2 лет назад

Уязвимость реализации конфигурации инструмента очистки HTML для приложений Rails Rails Html Sanitizer, связанная с неправильной нейтрализацией входных данных во время генерации веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки

EPSS

Процентиль: 44%
0.00215
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79