Name | CVE-2022-23519 |
Description | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: allow both "math" and "style" elements, or allow both "svg" and "style" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include "math" or "svg" and "style" should either upgrade or use the following workaround immediately: Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3566-1, DLA-3902-1 |
Debian Bugs | 1027153 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ruby-rails-html-sanitizer (PTS) | stretch (lts), stretch | 1.0.3-2+deb9u1 | vulnerable |
buster (security), buster, buster (lts) | 1.0.4-1+deb10u2 | fixed | |
bullseye | 1.3.0-1 | vulnerable | |
bullseye (security) | 1.3.0-1+deb11u1 | fixed | |
sid, trixie, bookworm | 1.4.4-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby-rails-html-sanitizer | source | stretch | (unfixed) | end-of-life | ||
ruby-rails-html-sanitizer | source | buster | 1.0.4-1+deb10u2 | DLA-3566-1 | ||
ruby-rails-html-sanitizer | source | bullseye | 1.3.0-1+deb11u1 | DLA-3902-1 | ||
ruby-rails-html-sanitizer | source | (unstable) | 1.4.4-1 | 1027153 |
https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
https://github.com/flavorjones/loofah/blob/main/docs/2022-10-decision-on-cdata-nodes.md
https://github.com/rails/rails-html-sanitizer/commit/e6d52d3b6db99d07399498b1287997302d444a8d (v1.4.4)
https://github.com/rails/rails-html-sanitizer/commit/0713caf2ee23801cfb85e37065cf406368b20082 (v1.4.4)
https://github.com/rails/rails-html-sanitizer/commit/68ccf7e1dbaa425cc4a8651d5f583e754ef5061c (v1.5.0)
https://github.com/rails/rails-html-sanitizer/commit/373fc6295918c4b0aad02111e869f4e0c6fc788b (v1.5.0)
Replaces CVE-2022-32209 fix, requires 'cdata_escape' from ruby-loofah >= 2.19.1.