Sha256: 12d1c74389594e6484ca4a280ca130d696f2cdf9a01e04c17772b94497063e01

Contents?: true

Size: 698 Bytes

Versions: 3

Compression:

Stored size: 698 Bytes

Contents

---
gem: sanitize
cve: 2018-3740
date: 2018-03-19
url: https://github.com/rgrove/sanitize/issues/176
title: HTML injection/XSS in Sanitize
description: |
  When Sanitize gem is used in combination with libxml2 >= 2.9.2,
  a specially crafted HTML fragment can cause libxml2 to generate
  improperly escaped output, allowing non-whitelisted attributes to be
  used on whitelisted elements.

  This can allow HTML and JavaScript injection, which could result in XSS
  if Sanitize's output is served to browsers.
unaffected_versions:
  - "< 1.1.0"
patched_versions:
  - "~> 2.1.1"
  - ">= 4.6.3"
related:
  url:
    - https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/sanitize/CVE-2018-3740.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/sanitize/CVE-2018-3740.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/sanitize/CVE-2018-3740.yml