-
-
Notifications
You must be signed in to change notification settings - Fork 232
Expand file tree
/
Copy pathCVE-2018-3740.yml
More file actions
24 lines (23 loc) · 732 Bytes
/
CVE-2018-3740.yml
File metadata and controls
24 lines (23 loc) · 732 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
---
gem: sanitize
cve: 2018-3740
ghsa: 7f42-p84j-f58p
url: https://github.com/rgrove/sanitize/issues/176
title: HTML injection/XSS in Sanitize
date: 2018-03-19
description: |
When Sanitize gem is used in combination with libxml2 >= 2.9.2,
a specially crafted HTML fragment can cause libxml2 to generate
improperly escaped output, allowing non-whitelisted attributes to be
used on whitelisted elements.
This can allow HTML and JavaScript injection, which could result in XSS
if Sanitize's output is served to browsers.
cvss_v3: 7.5
unaffected_versions:
- "< 1.1.0"
patched_versions:
- "~> 2.1.1"
- ">= 4.6.3"
related:
url:
- https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e