Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-7580 (GCVE-0-2015-7580)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:28.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[rubyonrails-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "name": "SUSE-SU-2016:1146", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "name": "1034816", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034816" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "name": "SUSE-SU-2016:0391", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-09T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[rubyonrails-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "name": "SUSE-SU-2016:1146", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "name": "1034816", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034816" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "name": "SUSE-SU-2016:0391", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[rubyonrails-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "name": "1034816", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034816" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-7580", "datePublished": "2016-02-16T02:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:28.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-7580\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-02-16T02:59:03.970\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en lib/rails/html/scrubbers.rb en la gema rails-html-sanitizer en versiones anteriores a 1.0.3 para Ruby on Rails 4.2.x y 5.x permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un nodo CDATA manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*\",\"versionEndIncluding\":\"1.0.2\",\"matchCriteriaId\":\"4CBB3D93-016A-43CA-9325-3F5D58DD4FD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A68D41F-36A9-4B77-814D-996F4E48FA79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"709A19A5-8FD1-4F9C-A38C-F06242A94D68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8104482C-E8F5-40A7-8B27-234FEF725FD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF8677-EA00-4F7E-BFF9-272482206DB5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85435026-9855-4BF4-A436-832628B005FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C2308F-A590-47B0-9791-7865D189196F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A266882-DABA-4A4C-88E6-60E993EE0947\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F1142C-3BFB-4B72-A033-81E20DB19D02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA738A1-227B-4665-B65E-666883FFAE96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10789A2D-6401-4119-BFBE-2EE4C16216D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"70ABD462-7142-4831-8EB6-801EC1D05573\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D717DB-7C80-48AA-A774-E291D2E75D6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B357FB-0307-4EFA-9C5B-3C2CDEA48584\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BD8840-0F1C-49D3-B843-9CFE64948018\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79D5B492-43F9-470F-BD21-6EFD93E78453\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC1F602-D48C-458A-A063-4050BE3BB25F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A1C015-56AD-489C-B301-68CF1DBF1BEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD191625-ACE2-46B6-9AAD-12D682C732C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C7DB56-267B-4057-A9BA-36D1E58C6282\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC163D49-691B-4125-A983-6CF6F6D86DEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B537D1-1584-4D15-9C75-08ED4D45DC3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3B4233-E117-4E77-A60D-3DFD5073154D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8F94CF-D504-4165-A69E-3F1198CB162A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C25977-AB6C-45E1-8956-871EB31B36BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0AB6B0-3506-4332-A183-309FAC4882CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/25/15\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1034816\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/25/15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2016:1146-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for portus", "title": "Title of the patch" }, { "category": "description", "text": "\nPortus was updated to version 2.0.3, which brings several fixes and enhancements:\n\n- Fixed crono job when a repository could not be found.\n- Fixed compatibility issues with Docker 1.10 and Distribution 2.3.\n- Handle multiple scopes in token requests.\n- Add optional fields to token response.\n- Fixed notification events for Distribution v2.3.\n- Paginate through the catalog properly.\n- Do not remove all the repositories if fetching one fails.\n- Fixed SMTP setup.\n- Don\u0027t let crono overflow the \u0027log\u0027 column on the DB.\n- Show the actual LDAP error on invalid login.\n- Fixed the location of crono logs.\n- Always use relative paths.\n- Set RUBYLIB when using portusctl.\n- Don\u0027t count hidden teams on the admin panel.\n- Warn developers on unsupported docker-compose versions.\n- Directly invalidate LDAP logins without name and password.\n- Don\u0027t show the \u0027I forgot my password\u0027 link on LDAP.\n\nThe following Rubygems bundled within Portus have been updated to fix security\nissues:\n\n- CVE-2016-2098: rubygem-actionpack (bsc#969943).\n- CVE-2015-7578: rails-html-sanitizer (bsc#963326).\n- CVE-2015-7579: rails-html-sanitizer (bsc#963327).\n- CVE-2015-7580: rails-html-sanitizer (bsc#963328).\n- CVE-2015-7576: rubygem-actionpack, rubygem-activesupport (bsc#963563).\n- CVE-2015-7577: rubygem-activerecord (bsc#963604).\n- CVE-2016-0751: rugygem-actionpack (bsc#963627).\n- CVE-2016-0752: rubygem-actionpack, rubygem-actionview (bsc#963608).\n- CVE-2016-0753: rubygem-activemodel, rubygem-activesupport, rubygem-activerecord (bsc#963617).\n- CVE-2015-7581: rubygem-actionpack (bsc#963625).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Containers-12-2016-672", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1146-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1146-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161146-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1146-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-April/002027.html" }, { "category": "self", "summary": "SUSE Bug 963326", "url": "https://bugzilla.suse.com/963326" }, { "category": "self", "summary": "SUSE Bug 963327", "url": "https://bugzilla.suse.com/963327" }, { "category": "self", "summary": "SUSE Bug 963328", "url": "https://bugzilla.suse.com/963328" }, { "category": "self", "summary": "SUSE Bug 963563", "url": "https://bugzilla.suse.com/963563" }, { "category": "self", "summary": "SUSE Bug 963604", "url": "https://bugzilla.suse.com/963604" }, { "category": "self", "summary": "SUSE Bug 963608", "url": "https://bugzilla.suse.com/963608" }, { "category": "self", "summary": "SUSE Bug 963617", "url": "https://bugzilla.suse.com/963617" }, { "category": "self", "summary": "SUSE Bug 963625", "url": "https://bugzilla.suse.com/963625" }, { "category": "self", "summary": "SUSE Bug 963627", "url": "https://bugzilla.suse.com/963627" }, { "category": "self", "summary": "SUSE Bug 969943", "url": "https://bugzilla.suse.com/969943" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7576 page", "url": "https://www.suse.com/security/cve/CVE-2015-7576/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7577 page", "url": "https://www.suse.com/security/cve/CVE-2015-7577/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7581 page", "url": "https://www.suse.com/security/cve/CVE-2015-7581/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0751 page", "url": "https://www.suse.com/security/cve/CVE-2016-0751/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0752 page", "url": "https://www.suse.com/security/cve/CVE-2016-0752/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0753 page", "url": "https://www.suse.com/security/cve/CVE-2016-0753/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2098 page", "url": "https://www.suse.com/security/cve/CVE-2016-2098/" } ], "title": "Security update for portus", "tracking": { "current_release_date": "2016-04-25T14:28:51Z", "generator": { "date": "2016-04-25T14:28:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1146-1", "initial_release_date": "2016-04-25T14:28:51Z", "revision_history": [ { "date": "2016-04-25T14:28:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "portus-2.0.3-2.4.x86_64", "product": { "name": "portus-2.0.3-2.4.x86_64", "product_id": "portus-2.0.3-2.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 12", "product": { "name": "SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "portus-2.0.3-2.4.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" }, "product_reference": "portus-2.0.3-2.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7576" } ], "notes": [ { "category": "general", "text": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7576", "url": "https://www.suse.com/security/cve/CVE-2015-7576" }, { "category": "external", "summary": "SUSE Bug 963329 for CVE-2015-7576", "url": "https://bugzilla.suse.com/963329" }, { "category": "external", "summary": "SUSE Bug 963563 for CVE-2015-7576", "url": "https://bugzilla.suse.com/963563" }, { "category": "external", "summary": "SUSE Bug 970715 for CVE-2015-7576", "url": "https://bugzilla.suse.com/970715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7576" }, { "cve": "CVE-2015-7577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7577" } ], "notes": [ { "category": "general", "text": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7577", "url": "https://www.suse.com/security/cve/CVE-2015-7577" }, { "category": "external", "summary": "SUSE Bug 963330 for CVE-2015-7577", "url": "https://bugzilla.suse.com/963330" }, { "category": "external", "summary": "SUSE Bug 963604 for CVE-2015-7577", "url": "https://bugzilla.suse.com/963604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7577" }, { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2015-7581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7581" } ], "notes": [ { "category": "general", "text": "actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application\u0027s use of a wildcard controller route.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7581", "url": "https://www.suse.com/security/cve/CVE-2015-7581" }, { "category": "external", "summary": "SUSE Bug 963335 for CVE-2015-7581", "url": "https://bugzilla.suse.com/963335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7581" }, { "cve": "CVE-2016-0751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0751" } ], "notes": [ { "category": "general", "text": "actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0751", "url": "https://www.suse.com/security/cve/CVE-2016-0751" }, { "category": "external", "summary": "SUSE Bug 963331 for CVE-2016-0751", "url": "https://bugzilla.suse.com/963331" }, { "category": "external", "summary": "SUSE Bug 963627 for CVE-2016-0751", "url": "https://bugzilla.suse.com/963627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2016-0751" }, { "cve": "CVE-2016-0752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0752" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0752", "url": "https://www.suse.com/security/cve/CVE-2016-0752" }, { "category": "external", "summary": "SUSE Bug 963332 for CVE-2016-0752", "url": "https://bugzilla.suse.com/963332" }, { "category": "external", "summary": "SUSE Bug 963608 for CVE-2016-0752", "url": "https://bugzilla.suse.com/963608" }, { "category": "external", "summary": "SUSE Bug 968850 for CVE-2016-0752", "url": "https://bugzilla.suse.com/968850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2016-0752" }, { "cve": "CVE-2016-0753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0753" } ], "notes": [ { "category": "general", "text": "Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0753", "url": "https://www.suse.com/security/cve/CVE-2016-0753" }, { "category": "external", "summary": "SUSE Bug 963334 for CVE-2016-0753", "url": "https://bugzilla.suse.com/963334" }, { "category": "external", "summary": "SUSE Bug 963617 for CVE-2016-0753", "url": "https://bugzilla.suse.com/963617" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2016-0753" }, { "cve": "CVE-2016-2098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2098" } ], "notes": [ { "category": "general", "text": "Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application\u0027s unrestricted use of the render method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2098", "url": "https://www.suse.com/security/cve/CVE-2016-2098" }, { "category": "external", "summary": "SUSE Bug 968849 for CVE-2016-2098", "url": "https://bugzilla.suse.com/968849" }, { "category": "external", "summary": "SUSE Bug 969943 for CVE-2016-2098", "url": "https://bugzilla.suse.com/969943" }, { "category": "external", "summary": "SUSE Bug 993313 for CVE-2016-2098", "url": "https://bugzilla.suse.com/993313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "important" } ], "title": "CVE-2016-2098" } ] }
suse-su-2016:0391-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rubygem-rails-html-sanitizer", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for rubygem-rails-html-sanitizer fixes the following issues:\n\n- CVE-2015-7579: XSS vulnerability in rails-html-sanitizer (bsc#963327)\n- CVE-2015-7578: XSS vulnerability via attributes (bsc#963326)\n- CVE-2015-7580: XSS via whitelist sanitizer (bsc#963328)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-Storage-2.1-2016-228", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0391-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0391-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160391-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0391-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001864.html" }, { "category": "self", "summary": "SUSE Bug 963326", "url": "https://bugzilla.suse.com/963326" }, { "category": "self", "summary": "SUSE Bug 963327", "url": "https://bugzilla.suse.com/963327" }, { "category": "self", "summary": "SUSE Bug 963328", "url": "https://bugzilla.suse.com/963328" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" } ], "title": "Security update for rubygem-rails-html-sanitizer", "tracking": { "current_release_date": "2016-02-09T10:02:32Z", "generator": { "date": "2016-02-09T10:02:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0391-1", "initial_release_date": "2016-02-09T10:02:32Z", "revision_history": [ { "date": "2016-02-09T10:02:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Enterprise Storage 2.1", "product": { "name": "SUSE Enterprise Storage 2.1", "product_id": "SUSE Enterprise Storage 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:2.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64 as component of SUSE Enterprise Storage 2.1", "product_id": "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7580" } ] }
ghsa-ghqm-pgxj-37gq
Vulnerability from github
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb
in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
{ "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-7580" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:37:28Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in `lib/rails/html/scrubbers.rb` in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "id": "GHSA-ghqm-pgxj-37gq", "modified": "2023-01-23T21:16:04Z", "published": "2017-10-24T18:33:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7580" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer" }, { "type": "WEB", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "type": "WEB", "url": "https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "rails-html-sanitizer Cross-site Scripting vulnerability" }
opensuse-su-2024:12145-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12145", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12145-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12145-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:11349-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11349", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11349-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" } ], "title": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11349-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" } ] }
opensuse-su-2024:14175-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14175-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "tracking": { "current_release_date": "2024-07-12T00:00:00Z", "generator": { "date": "2024-07-12T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14175-1", "initial_release_date": "2024-07-12T00:00:00Z", "revision_history": [ { "date": "2024-07-12T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:10189-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10189", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10189-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" } ], "title": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10189-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" } ] }
opensuse-su-2024:13137-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13137", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13137-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13137-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2025:15125-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15125", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15125-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "tracking": { "current_release_date": "2025-05-17T00:00:00Z", "generator": { "date": "2025-05-17T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15125-1", "initial_release_date": "2025-05-17T00:00:00Z", "revision_history": [ { "date": "2025-05-17T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
fkie_cve-2015-7580
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
rubyonrails | html_sanitizer | * | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.2 | |
rubyonrails | rails | 4.2.3 | |
rubyonrails | rails | 4.2.3 | |
rubyonrails | rails | 4.2.4 | |
rubyonrails | rails | 4.2.4 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5.1 | |
rubyonrails | rails | 4.2.5.2 | |
rubyonrails | rails | 4.2.6 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "4CBB3D93-016A-43CA-9325-3F5D58DD4FD4", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EC163D49-691B-4125-A983-6CF6F6D86DEE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "68B537D1-1584-4D15-9C75-08ED4D45DC3A", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "1E3B4233-E117-4E77-A60D-3DFD5073154D", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*", "matchCriteriaId": "C8C25977-AB6C-45E1-8956-871EB31B36BA", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "5F0AB6B0-3506-4332-A183-309FAC4882CE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node." }, { "lang": "es", "value": "Vulnerabilidad de XSS en lib/rails/html/scrubbers.rb en la gema rails-html-sanitizer en versiones anteriores a 1.0.3 para Ruby on Rails 4.2.x y 5.x permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un nodo CDATA manipulado." } ], "id": "CVE-2015-7580", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-16T02:59:03.970", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1034816" }, { "source": "secalert@redhat.com", "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2015-7580
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-7580", "description": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "id": "GSD-2015-7580", "references": [ "https://www.suse.com/security/cve/CVE-2015-7580.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer", "purl": "pkg:gem/rails-html-sanitizer" } } ], "aliases": [ "CVE-2015-7580", "GHSA-ghqm-pgxj-37gq" ], "details": "There is a possible XSS vulnerability in the white list sanitizer in the\nrails-html-sanitizer gem. This vulnerability has been assigned the CVE\nidentifier CVE-2015-7580.\n\nVersions Affected: All.\nNot affected: None.\nFixed Versions: v1.0.3\n\nImpact\n------\nCarefully crafted strings can cause user input to bypass the sanitization in\nthe white list sanitizer which will can lead to an XSS attack.\n\nVulnerable code will look something like this:\n\n \u003c%= sanitize user_input, tags: %w(em) %\u003e\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\nReleases\n--------\nThe FIXED releases are available at the normal locations.\n\nWorkarounds\n-----------\nPutting the following monkey patch in an initializer can help to mitigate the\nissue:\n\n```\nclass Rails::Html::PermitScrubber\n alias :old_scrub :scrub\n alias :old_skip_node? :skip_node?\n\n def scrub(node)\n if node.cdata?\n text = node.document.create_text_node node.text\n node.replace text\n return CONTINUE\n end\n old_scrub node\n end\n\n def skip_node?(node); node.text?; end\nend\n```\n\nPatches\n-------\nTo aid users who aren\u0027t able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 1-0-whitelist_sanitizer_xss.patch - Patch for 1.0 series\n\nCredits\n-------\nThanks to Arnaud Germis, Nate Clark, and John Colvin for reporting this issue.\n", "id": "GSD-2015-7580", "modified": "2016-01-25T00:00:00.000Z", "published": "2016-01-25T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" } ], "schema_version": "1.4.0", "severity": [ { "score": 6.1, "type": "CVSS_V3" } ], "summary": "Possible XSS vulnerability in rails-html-sanitizer" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[rubyonrails-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "name": "1034816", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034816" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ] } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2015-7580", "cvss_v3": 6.1, "date": "2016-01-25", "description": "There is a possible XSS vulnerability in the white list sanitizer in the\nrails-html-sanitizer gem. This vulnerability has been assigned the CVE\nidentifier CVE-2015-7580.\n\nVersions Affected: All.\nNot affected: None.\nFixed Versions: v1.0.3\n\nImpact\n------\nCarefully crafted strings can cause user input to bypass the sanitization in\nthe white list sanitizer which will can lead to an XSS attack.\n\nVulnerable code will look something like this:\n\n \u003c%= sanitize user_input, tags: %w(em) %\u003e\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\nReleases\n--------\nThe FIXED releases are available at the normal locations.\n\nWorkarounds\n-----------\nPutting the following monkey patch in an initializer can help to mitigate the\nissue:\n\n```\nclass Rails::Html::PermitScrubber\n alias :old_scrub :scrub\n alias :old_skip_node? :skip_node?\n\n def scrub(node)\n if node.cdata?\n text = node.document.create_text_node node.text\n node.replace text\n return CONTINUE\n end\n old_scrub node\n end\n\n def skip_node?(node); node.text?; end\nend\n```\n\nPatches\n-------\nTo aid users who aren\u0027t able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 1-0-whitelist_sanitizer_xss.patch - Patch for 1.0 series\n\nCredits\n-------\nThanks to Arnaud Germis, Nate Clark, and John Colvin for reporting this issue.\n", "gem": "rails-html-sanitizer", "ghsa": "ghqm-pgxj-37gq", "patched_versions": [ "\u003e= 1.0.3" ], "title": "Possible XSS vulnerability in rails-html-sanitizer", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.0.3", "affected_versions": "All versions before 1.0.3", "credit": "Arnaud Germis, Nate Clark, and John Colvin", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-937" ], "date": "2019-08-08", "description": "Carefully crafted strings can cause user input to bypass the sanitization in the white list sanitizer which can lead to an XSS attack. ", "fixed_versions": [ "1.0.3" ], "identifier": "CVE-2015-7580", "identifiers": [ "CVE-2015-7580" ], "package_slug": "gem/rails-html-sanitizer", "pubdate": "2016-02-15", "solution": "Upgrade to latest or apply patches.", "title": "XSS vulnerability - white list bypass", "urls": [ "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" ], "uuid": "e1e09e37-2fe3-4ecd-b628-61e989a985b9" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "cpe_name": [], "versionEndIncluding": "1.0.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7580" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "[rubyonrails-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "tags": [], "url": "https://groups.google.com/forum/message/raw?msg=rubyonrails-security/uh--W4TDwmI/m_CVZtdbFQAJ" }, { "name": "[oss-security] 20160125 [CVE-2015-7580] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/15" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/rails/rails-html-sanitizer/commit/63903b0eaa6d2a4e1c91bc86008256c4c8335e78" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "1034816", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1034816" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2019-08-08T15:16Z", "publishedDate": "2016-02-16T02:59Z" } } }
cnvd-2016-00963
Vulnerability from cnvd
Title: Ruby on Rails rails-html-sanitizer跨站脚本漏洞
Description:
Ruby on Rails是Rails核心团队开发维护的一套基于Ruby语言的开源Web应用框架。rails-html-sanitizer是其中的一个HTML代码清理包。
Ruby on Rails rails-html-sanitizer存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。
Severity: 中
Patch Name: Ruby on Rails rails-html-sanitizer跨站脚本漏洞的补丁
Patch Description:
Ruby on Rails是Rails核心团队开发维护的一套基于Ruby语言的开源Web应用框架。rails-html-sanitizer是其中的一个HTML代码清理包。
Ruby on Rails rails-html-sanitizer存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/
Reference: http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/
Name | Ruby on Rails Ruby on Rails |
---|
{ "bids": { "bid": { "bidNumber": "81802" } }, "cves": { "cve": { "cveNumber": "CVE-2015-7580" } }, "description": "Ruby on Rails\u662fRails\u6838\u5fc3\u56e2\u961f\u5f00\u53d1\u7ef4\u62a4\u7684\u4e00\u5957\u57fa\u4e8eRuby\u8bed\u8a00\u7684\u5f00\u6e90Web\u5e94\u7528\u6846\u67b6\u3002rails-html-sanitizer\u662f\u5176\u4e2d\u7684\u4e00\u4e2aHTML\u4ee3\u7801\u6e05\u7406\u5305\u3002\r\n\r\nRuby on Rails rails-html-sanitizer\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e,\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002", "discovererName": "Ben Murphy, Marien, Arnaud Germis, Nate Clark and John Colvin", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-00963", "openTime": "2016-02-16", "patchDescription": "Ruby on Rails\u662fRails\u6838\u5fc3\u56e2\u961f\u5f00\u53d1\u7ef4\u62a4\u7684\u4e00\u5957\u57fa\u4e8eRuby\u8bed\u8a00\u7684\u5f00\u6e90Web\u5e94\u7528\u6846\u67b6\u3002rails-html-sanitizer\u662f\u5176\u4e2d\u7684\u4e00\u4e2aHTML\u4ee3\u7801\u6e05\u7406\u5305\u3002\r\n\r\nRuby on Rails rails-html-sanitizer\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e,\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Ruby on Rails rails-html-sanitizer\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Ruby on Rails Ruby on Rails" }, "referenceLink": "http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/", "serverity": "\u4e2d", "submitTime": "2016-02-08", "title": "Ruby on Rails rails-html-sanitizer\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.