Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-7578 (GCVE-0-2015-7578)
Vulnerability from cvelistv5
Published
2016-02-16 02:00
Modified
2024-08-06 07:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:28.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2016-3a2606f993", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "name": "SUSE-SU-2016:1146", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "name": "1034816", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034816" }, { "name": "[ruby-security-ann] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "name": "FEDORA-2016-59ce8b61dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "name": "SUSE-SU-2016:0391", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-09T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2016-3a2606f993", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "name": "SUSE-SU-2016:1146", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "name": "1034816", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034816" }, { "name": "[ruby-security-ann] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "name": "FEDORA-2016-59ce8b61dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "name": "SUSE-SU-2016:0391", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-3a2606f993", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "name": "1034816", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034816" }, { "name": "[ruby-security-ann] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "name": "FEDORA-2016-59ce8b61dd", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-7578", "datePublished": "2016-02-16T02:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:28.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-7578\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-02-16T02:59:02.047\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en la gema rails-html-sanitizer en versiones anteriores a 1.0.3 para Ruby on Rails 4.2.x y 5.x permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de atributos de etiqueta manipulados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*\",\"versionEndIncluding\":\"1.0.2\",\"matchCriteriaId\":\"4CBB3D93-016A-43CA-9325-3F5D58DD4FD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A68D41F-36A9-4B77-814D-996F4E48FA79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"709A19A5-8FD1-4F9C-A38C-F06242A94D68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8104482C-E8F5-40A7-8B27-234FEF725FD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF8677-EA00-4F7E-BFF9-272482206DB5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"85435026-9855-4BF4-A436-832628B005FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C2308F-A590-47B0-9791-7865D189196F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A266882-DABA-4A4C-88E6-60E993EE0947\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83F1142C-3BFB-4B72-A033-81E20DB19D02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA738A1-227B-4665-B65E-666883FFAE96\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"10789A2D-6401-4119-BFBE-2EE4C16216D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"70ABD462-7142-4831-8EB6-801EC1D05573\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D717DB-7C80-48AA-A774-E291D2E75D6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B357FB-0307-4EFA-9C5B-3C2CDEA48584\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BD8840-0F1C-49D3-B843-9CFE64948018\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79D5B492-43F9-470F-BD21-6EFD93E78453\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EC1F602-D48C-458A-A063-4050BE3BB25F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A1C015-56AD-489C-B301-68CF1DBF1BEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD191625-ACE2-46B6-9AAD-12D682C732C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C7DB56-267B-4057-A9BA-36D1E58C6282\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC163D49-691B-4125-A983-6CF6F6D86DEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B537D1-1584-4D15-9C75-08ED4D45DC3A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3B4233-E117-4E77-A60D-3DFD5073154D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8F94CF-D504-4165-A69E-3F1198CB162A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C25977-AB6C-45E1-8956-871EB31B36BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0AB6B0-3506-4332-A183-309FAC4882CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/25/11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1034816\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/01/25/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
suse-su-2016:1146-1
Vulnerability from csaf_suse
Published
2016-04-25 14:28
Modified
2016-04-25 14:28
Summary
Security update for portus
Notes
Title of the patch
Security update for portus
Description of the patch
Portus was updated to version 2.0.3, which brings several fixes and enhancements:
- Fixed crono job when a repository could not be found.
- Fixed compatibility issues with Docker 1.10 and Distribution 2.3.
- Handle multiple scopes in token requests.
- Add optional fields to token response.
- Fixed notification events for Distribution v2.3.
- Paginate through the catalog properly.
- Do not remove all the repositories if fetching one fails.
- Fixed SMTP setup.
- Don't let crono overflow the 'log' column on the DB.
- Show the actual LDAP error on invalid login.
- Fixed the location of crono logs.
- Always use relative paths.
- Set RUBYLIB when using portusctl.
- Don't count hidden teams on the admin panel.
- Warn developers on unsupported docker-compose versions.
- Directly invalidate LDAP logins without name and password.
- Don't show the 'I forgot my password' link on LDAP.
The following Rubygems bundled within Portus have been updated to fix security
issues:
- CVE-2016-2098: rubygem-actionpack (bsc#969943).
- CVE-2015-7578: rails-html-sanitizer (bsc#963326).
- CVE-2015-7579: rails-html-sanitizer (bsc#963327).
- CVE-2015-7580: rails-html-sanitizer (bsc#963328).
- CVE-2015-7576: rubygem-actionpack, rubygem-activesupport (bsc#963563).
- CVE-2015-7577: rubygem-activerecord (bsc#963604).
- CVE-2016-0751: rugygem-actionpack (bsc#963627).
- CVE-2016-0752: rubygem-actionpack, rubygem-actionview (bsc#963608).
- CVE-2016-0753: rubygem-activemodel, rubygem-activesupport, rubygem-activerecord (bsc#963617).
- CVE-2015-7581: rubygem-actionpack (bsc#963625).
Patchnames
SUSE-SLE-Module-Containers-12-2016-672
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for portus", "title": "Title of the patch" }, { "category": "description", "text": "\nPortus was updated to version 2.0.3, which brings several fixes and enhancements:\n\n- Fixed crono job when a repository could not be found.\n- Fixed compatibility issues with Docker 1.10 and Distribution 2.3.\n- Handle multiple scopes in token requests.\n- Add optional fields to token response.\n- Fixed notification events for Distribution v2.3.\n- Paginate through the catalog properly.\n- Do not remove all the repositories if fetching one fails.\n- Fixed SMTP setup.\n- Don\u0027t let crono overflow the \u0027log\u0027 column on the DB.\n- Show the actual LDAP error on invalid login.\n- Fixed the location of crono logs.\n- Always use relative paths.\n- Set RUBYLIB when using portusctl.\n- Don\u0027t count hidden teams on the admin panel.\n- Warn developers on unsupported docker-compose versions.\n- Directly invalidate LDAP logins without name and password.\n- Don\u0027t show the \u0027I forgot my password\u0027 link on LDAP.\n\nThe following Rubygems bundled within Portus have been updated to fix security\nissues:\n\n- CVE-2016-2098: rubygem-actionpack (bsc#969943).\n- CVE-2015-7578: rails-html-sanitizer (bsc#963326).\n- CVE-2015-7579: rails-html-sanitizer (bsc#963327).\n- CVE-2015-7580: rails-html-sanitizer (bsc#963328).\n- CVE-2015-7576: rubygem-actionpack, rubygem-activesupport (bsc#963563).\n- CVE-2015-7577: rubygem-activerecord (bsc#963604).\n- CVE-2016-0751: rugygem-actionpack (bsc#963627).\n- CVE-2016-0752: rubygem-actionpack, rubygem-actionview (bsc#963608).\n- CVE-2016-0753: rubygem-activemodel, rubygem-activesupport, rubygem-activerecord (bsc#963617).\n- CVE-2015-7581: rubygem-actionpack (bsc#963625).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Containers-12-2016-672", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1146-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1146-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161146-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1146-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-April/002027.html" }, { "category": "self", "summary": "SUSE Bug 963326", "url": "https://bugzilla.suse.com/963326" }, { "category": "self", "summary": "SUSE Bug 963327", "url": "https://bugzilla.suse.com/963327" }, { "category": "self", "summary": "SUSE Bug 963328", "url": "https://bugzilla.suse.com/963328" }, { "category": "self", "summary": "SUSE Bug 963563", "url": "https://bugzilla.suse.com/963563" }, { "category": "self", "summary": "SUSE Bug 963604", "url": "https://bugzilla.suse.com/963604" }, { "category": "self", "summary": "SUSE Bug 963608", "url": "https://bugzilla.suse.com/963608" }, { "category": "self", "summary": "SUSE Bug 963617", "url": "https://bugzilla.suse.com/963617" }, { "category": "self", "summary": "SUSE Bug 963625", "url": "https://bugzilla.suse.com/963625" }, { "category": "self", "summary": "SUSE Bug 963627", "url": "https://bugzilla.suse.com/963627" }, { "category": "self", "summary": "SUSE Bug 969943", "url": "https://bugzilla.suse.com/969943" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7576 page", "url": "https://www.suse.com/security/cve/CVE-2015-7576/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7577 page", "url": "https://www.suse.com/security/cve/CVE-2015-7577/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7581 page", "url": "https://www.suse.com/security/cve/CVE-2015-7581/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0751 page", "url": "https://www.suse.com/security/cve/CVE-2016-0751/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0752 page", "url": "https://www.suse.com/security/cve/CVE-2016-0752/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0753 page", "url": "https://www.suse.com/security/cve/CVE-2016-0753/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2098 page", "url": "https://www.suse.com/security/cve/CVE-2016-2098/" } ], "title": "Security update for portus", "tracking": { "current_release_date": "2016-04-25T14:28:51Z", "generator": { "date": "2016-04-25T14:28:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1146-1", "initial_release_date": "2016-04-25T14:28:51Z", "revision_history": [ { "date": "2016-04-25T14:28:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "portus-2.0.3-2.4.x86_64", "product": { "name": "portus-2.0.3-2.4.x86_64", "product_id": "portus-2.0.3-2.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 12", "product": { "name": "SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "portus-2.0.3-2.4.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" }, "product_reference": "portus-2.0.3-2.4.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7576" } ], "notes": [ { "category": "general", "text": "The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7576", "url": "https://www.suse.com/security/cve/CVE-2015-7576" }, { "category": "external", "summary": "SUSE Bug 963329 for CVE-2015-7576", "url": "https://bugzilla.suse.com/963329" }, { "category": "external", "summary": "SUSE Bug 963563 for CVE-2015-7576", "url": "https://bugzilla.suse.com/963563" }, { "category": "external", "summary": "SUSE Bug 970715 for CVE-2015-7576", "url": "https://bugzilla.suse.com/970715" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2015-7576" }, { "cve": "CVE-2015-7577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7577" } ], "notes": [ { "category": "general", "text": "activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7577", "url": "https://www.suse.com/security/cve/CVE-2015-7577" }, { "category": "external", "summary": "SUSE Bug 963330 for CVE-2015-7577", "url": "https://bugzilla.suse.com/963330" }, { "category": "external", "summary": "SUSE Bug 963604 for CVE-2015-7577", "url": "https://bugzilla.suse.com/963604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2015-7577" }, { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2015-7581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7581" } ], "notes": [ { "category": "general", "text": "actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application\u0027s use of a wildcard controller route.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7581", "url": "https://www.suse.com/security/cve/CVE-2015-7581" }, { "category": "external", "summary": "SUSE Bug 963335 for CVE-2015-7581", "url": "https://bugzilla.suse.com/963335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2015-7581" }, { "cve": "CVE-2016-0751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0751" } ], "notes": [ { "category": "general", "text": "actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0751", "url": "https://www.suse.com/security/cve/CVE-2016-0751" }, { "category": "external", "summary": "SUSE Bug 963331 for CVE-2016-0751", "url": "https://bugzilla.suse.com/963331" }, { "category": "external", "summary": "SUSE Bug 963627 for CVE-2016-0751", "url": "https://bugzilla.suse.com/963627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2016-0751" }, { "cve": "CVE-2016-0752", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0752" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application\u0027s unrestricted use of the render method and providing a .. (dot dot) in a pathname.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0752", "url": "https://www.suse.com/security/cve/CVE-2016-0752" }, { "category": "external", "summary": "SUSE Bug 963332 for CVE-2016-0752", "url": "https://bugzilla.suse.com/963332" }, { "category": "external", "summary": "SUSE Bug 963608 for CVE-2016-0752", "url": "https://bugzilla.suse.com/963608" }, { "category": "external", "summary": "SUSE Bug 968850 for CVE-2016-0752", "url": "https://bugzilla.suse.com/968850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2016-0752" }, { "cve": "CVE-2016-0753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0753" } ], "notes": [ { "category": "general", "text": "Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0753", "url": "https://www.suse.com/security/cve/CVE-2016-0753" }, { "category": "external", "summary": "SUSE Bug 963334 for CVE-2016-0753", "url": "https://bugzilla.suse.com/963334" }, { "category": "external", "summary": "SUSE Bug 963617 for CVE-2016-0753", "url": "https://bugzilla.suse.com/963617" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "low" } ], "title": "CVE-2016-0753" }, { "cve": "CVE-2016-2098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2098" } ], "notes": [ { "category": "general", "text": "Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application\u0027s unrestricted use of the render method.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2098", "url": "https://www.suse.com/security/cve/CVE-2016-2098" }, { "category": "external", "summary": "SUSE Bug 968849 for CVE-2016-2098", "url": "https://bugzilla.suse.com/968849" }, { "category": "external", "summary": "SUSE Bug 969943 for CVE-2016-2098", "url": "https://bugzilla.suse.com/969943" }, { "category": "external", "summary": "SUSE Bug 993313 for CVE-2016-2098", "url": "https://bugzilla.suse.com/993313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:portus-2.0.3-2.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-25T14:28:51Z", "details": "important" } ], "title": "CVE-2016-2098" } ] }
suse-su-2016:0391-1
Vulnerability from csaf_suse
Published
2016-02-09 10:02
Modified
2016-02-09 10:02
Summary
Security update for rubygem-rails-html-sanitizer
Notes
Title of the patch
Security update for rubygem-rails-html-sanitizer
Description of the patch
This update for rubygem-rails-html-sanitizer fixes the following issues:
- CVE-2015-7579: XSS vulnerability in rails-html-sanitizer (bsc#963327)
- CVE-2015-7578: XSS vulnerability via attributes (bsc#963326)
- CVE-2015-7580: XSS via whitelist sanitizer (bsc#963328)
Patchnames
SUSE-Storage-2.1-2016-228
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rubygem-rails-html-sanitizer", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for rubygem-rails-html-sanitizer fixes the following issues:\n\n- CVE-2015-7579: XSS vulnerability in rails-html-sanitizer (bsc#963327)\n- CVE-2015-7578: XSS vulnerability via attributes (bsc#963326)\n- CVE-2015-7580: XSS via whitelist sanitizer (bsc#963328)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-Storage-2.1-2016-228", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_0391-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:0391-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160391-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:0391-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-February/001864.html" }, { "category": "self", "summary": "SUSE Bug 963326", "url": "https://bugzilla.suse.com/963326" }, { "category": "self", "summary": "SUSE Bug 963327", "url": "https://bugzilla.suse.com/963327" }, { "category": "self", "summary": "SUSE Bug 963328", "url": "https://bugzilla.suse.com/963328" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" } ], "title": "Security update for rubygem-rails-html-sanitizer", "tracking": { "current_release_date": "2016-02-09T10:02:32Z", "generator": { "date": "2016-02-09T10:02:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:0391-1", "initial_release_date": "2016-02-09T10:02:32Z", "revision_history": [ { "date": "2016-02-09T10:02:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "product": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "product_id": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Enterprise Storage 2.1", "product": { "name": "SUSE Enterprise Storage 2.1", "product_id": "SUSE Enterprise Storage 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:2.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64 as component of SUSE Enterprise Storage 2.1", "product_id": "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" }, "product_reference": "ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 2.1:ruby2.1-rubygem-rails-html-sanitizer-1.0.2-7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-02-09T10:02:32Z", "details": "moderate" } ], "title": "CVE-2015-7580" } ] }
fkie_cve-2015-7578
Vulnerability from fkie_nvd
Published
2016-02-16 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/01/25/11 | ||
secalert@redhat.com | http://www.securitytracker.com/id/1034816 | ||
secalert@redhat.com | https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4 | ||
secalert@redhat.com | https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/01/25/11 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034816 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rubyonrails | html_sanitizer | * | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.0 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.1 | |
rubyonrails | rails | 4.2.2 | |
rubyonrails | rails | 4.2.3 | |
rubyonrails | rails | 4.2.3 | |
rubyonrails | rails | 4.2.4 | |
rubyonrails | rails | 4.2.4 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5 | |
rubyonrails | rails | 4.2.5.1 | |
rubyonrails | rails | 4.2.5.2 | |
rubyonrails | rails | 4.2.6 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 | |
rubyonrails | rails | 5.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "4CBB3D93-016A-43CA-9325-3F5D58DD4FD4", "versionEndIncluding": "1.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A68D41F-36A9-4B77-814D-996F4E48FA79", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "709A19A5-8FD1-4F9C-A38C-F06242A94D68", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "8104482C-E8F5-40A7-8B27-234FEF725FD0", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "2CFF8677-EA00-4F7E-BFF9-272482206DB5", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8D7DF5CD-DA28-492D-B5EE-D252ECCC8D96", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "85435026-9855-4BF4-A436-832628B005FD", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "56C2308F-A590-47B0-9791-7865D189196F", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "9A266882-DABA-4A4C-88E6-60E993EE0947", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "83F1142C-3BFB-4B72-A033-81E20DB19D02", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "1FA738A1-227B-4665-B65E-666883FFAE96", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "6F00718C-A9E8-4E85-8DA6-33BF11F2DCCE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*", "matchCriteriaId": "10789A2D-6401-4119-BFBE-2EE4C16216D3", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*", "matchCriteriaId": "70ABD462-7142-4831-8EB6-801EC1D05573", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "81D717DB-7C80-48AA-A774-E291D2E75D6E", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "06B357FB-0307-4EFA-9C5B-3C2CDEA48584", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "E4BD8840-0F1C-49D3-B843-9CFE64948018", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "79D5B492-43F9-470F-BD21-6EFD93E78453", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*", "matchCriteriaId": "4EC1F602-D48C-458A-A063-4050BE3BB25F", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "F6A1C015-56AD-489C-B301-68CF1DBF1BEF", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*", "matchCriteriaId": "FD191625-ACE2-46B6-9AAD-12D682C732C2", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*", "matchCriteriaId": "02C7DB56-267B-4057-A9BA-36D1E58C6282", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "EC163D49-691B-4125-A983-6CF6F6D86DEE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "68B537D1-1584-4D15-9C75-08ED4D45DC3A", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*", "matchCriteriaId": "1E3B4233-E117-4E77-A60D-3DFD5073154D", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "AF8F94CF-D504-4165-A69E-3F1198CB162A", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*", "matchCriteriaId": "C8C25977-AB6C-45E1-8956-871EB31B36BA", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "5F0AB6B0-3506-4332-A183-309FAC4882CE", "vulnerable": false }, { "criteria": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "6D7B4EBC-B634-4AD7-9F7A-54D14821D5AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes." }, { "lang": "es", "value": "Vulnerabilidad de XSS en la gema rails-html-sanitizer en versiones anteriores a 1.0.3 para Ruby on Rails 4.2.x y 5.x permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de atributos de etiqueta manipulados." } ], "id": "CVE-2015-7578", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-16T02:59:02.047", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id/1034816" }, { "source": "secalert@redhat.com", "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "source": "secalert@redhat.com", "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1034816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:13137-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media
Notes
Title of the patch
ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13137
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13137", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13137-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13137-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "product_id": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" }, "product_reference": "ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.aarch64", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.ppc64le", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.s390x", "openSUSE Tumbleweed:ruby3.2-rubygem-rails-html-sanitizer-1.5.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:11349-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media
Notes
Title of the patch
ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media
Description of the patch
These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11349
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11349", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11349-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" } ], "title": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11349-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } }, { "category": "product_version", "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "product_id": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" }, "product_reference": "ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby2.7-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.aarch64", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.ppc64le", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.s390x", "openSUSE Tumbleweed:ruby3.0-rubygem-rails-html-sanitizer-1.4.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" } ] }
opensuse-su-2024:14175-1
Vulnerability from csaf_opensuse
Published
2024-07-12 00:00
Modified
2024-07-12 00:00
Summary
ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media
Notes
Title of the patch
ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media
Description of the patch
These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14175
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14175", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14175-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5 on GA media", "tracking": { "current_release_date": "2024-07-12T00:00:00Z", "generator": { "date": "2024-07-12T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14175-1", "initial_release_date": "2024-07-12T00:00:00Z", "revision_history": [ { "date": "2024-07-12T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "product_id": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" }, "product_reference": "ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.aarch64", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.ppc64le", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.s390x", "openSUSE Tumbleweed:ruby3.3-rubygem-rails-html-sanitizer-1.6.0-1.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-07-12T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2025:15125-1
Vulnerability from csaf_opensuse
Published
2025-05-17 00:00
Modified
2025-05-17 00:00
Summary
ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media
Notes
Title of the patch
ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media
Description of the patch
These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15125
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15125", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15125-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15125-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23517 page", "url": "https://www.suse.com/security/cve/CVE-2022-23517/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23518 page", "url": "https://www.suse.com/security/cve/CVE-2022-23518/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23519 page", "url": "https://www.suse.com/security/cve/CVE-2022-23519/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23520 page", "url": "https://www.suse.com/security/cve/CVE-2022-23520/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7 on GA media", "tracking": { "current_release_date": "2025-05-17T00:00:00Z", "generator": { "date": "2025-05-17T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15125-1", "initial_release_date": "2025-05-17T00:00:00Z", "revision_history": [ { "date": "2025-05-17T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "product_id": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" }, "product_reference": "ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-23517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23517" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer \u003c 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23517", "url": "https://www.suse.com/security/cve/CVE-2022-23517" }, { "category": "external", "summary": "SUSE Bug 1206433 for CVE-2022-23517", "url": "https://bugzilla.suse.com/1206433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23517" }, { "cve": "CVE-2022-23518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23518" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions \u003e= 1.0.3, \u003c 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah \u003e= 2.1.0. This issue is patched in version 1.4.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23518", "url": "https://www.suse.com/security/cve/CVE-2022-23518" }, { "category": "external", "summary": "SUSE Bug 1206434 for CVE-2022-23518", "url": "https://bugzilla.suse.com/1206434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23518" }, { "cve": "CVE-2022-23519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23519" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags in either of the following ways: allow both \"math\" and \"style\" elements, or allow both \"svg\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. . This issue is fixed in version 1.4.4. All users overriding the allowed tags to include \"math\" or \"svg\" and \"style\" should either upgrade or use the following workaround immediately: Remove \"style\" from the overridden allowed tags, or remove \"math\" and \"svg\" from the overridden allowed tags.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23519", "url": "https://www.suse.com/security/cve/CVE-2022-23519" }, { "category": "external", "summary": "SUSE Bug 1206435 for CVE-2022-23519", "url": "https://bugzilla.suse.com/1206435" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "important" } ], "title": "CVE-2022-23519" }, { "cve": "CVE-2022-23520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23520" } ], "notes": [ { "category": "general", "text": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, there is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer due to an incomplete fix of CVE-2022-32209. Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both \"select\" and \"style\" elements. Code is only impacted if allowed tags are being overridden. This issue is patched in version 1.4.4. All users overriding the allowed tags to include both \"select\" and \"style\" should either upgrade or use this workaround: Remove either \"select\" or \"style\" from the overridden allowed tags. NOTE: Code is _not_ impacted if allowed tags are overridden using either the :tags option to the Action View helper method sanitize or the :tags option to the instance method SafeListSanitizer#sanitize.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23520", "url": "https://www.suse.com/security/cve/CVE-2022-23520" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-23520", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-23520" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.aarch64", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.ppc64le", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.s390x", "openSUSE Tumbleweed:ruby3.4-rubygem-rails-html-sanitizer-1.6.0-1.7.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-17T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
opensuse-su-2024:10189-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media
Notes
Title of the patch
ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media
Description of the patch
These are all security issues fixed in the ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10189
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10189", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10189-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" } ], "title": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10189-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product_id": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" } }, { "category": "product_version", "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "product_id": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" }, "product_reference": "ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.2-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-doc-1.0.3-1.2.x86_64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.aarch64", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.ppc64le", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.s390x", "openSUSE Tumbleweed:ruby2.3-rubygem-rails-html-sanitizer-testsuite-1.0.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" } ] }
opensuse-su-2024:12145-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media
Notes
Title of the patch
ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12145
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12145", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12145-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7578 page", "url": "https://www.suse.com/security/cve/CVE-2015-7578/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7579 page", "url": "https://www.suse.com/security/cve/CVE-2015-7579/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7580 page", "url": "https://www.suse.com/security/cve/CVE-2015-7580/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3741 page", "url": "https://www.suse.com/security/cve/CVE-2018-3741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-32209 page", "url": "https://www.suse.com/security/cve/CVE-2022-32209/" } ], "title": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12145-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "product_id": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" }, "product_reference": "ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7578" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7578", "url": "https://www.suse.com/security/cve/CVE-2015-7578" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7578", "url": "https://bugzilla.suse.com/963326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7579" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7579", "url": "https://www.suse.com/security/cve/CVE-2015-7579" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7579", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7580" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7580", "url": "https://www.suse.com/security/cve/CVE-2015-7580" }, { "category": "external", "summary": "SUSE Bug 963326 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963326" }, { "category": "external", "summary": "SUSE Bug 963327 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963327" }, { "category": "external", "summary": "SUSE Bug 963328 for CVE-2015-7580", "url": "https://bugzilla.suse.com/963328" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7580" }, { "cve": "CVE-2018-3741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3741" } ], "notes": [ { "category": "general", "text": "There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3741", "url": "https://www.suse.com/security/cve/CVE-2018-3741" }, { "category": "external", "summary": "SUSE Bug 1085967 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1085967" }, { "category": "external", "summary": "SUSE Bug 1086598 for CVE-2018-3741", "url": "https://bugzilla.suse.com/1086598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3741" }, { "cve": "CVE-2022-32209", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-32209" } ], "notes": [ { "category": "general", "text": "# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer\u0027s allowed tags to allow both `select` and `style` elements.Code is only impacted if allowed tags are being overridden. This may be done via application configuration:```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = [\"select\", \"style\"]```see https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr it may be done with a `:tags` option to the Action View helper `sanitize`:```\u003c%= sanitize @comment.body, tags: [\"select\", \"style\"] %\u003e```see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr it may be done with Rails::Html::SafeListSanitizer directly:```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = [\"select\", \"style\"]```or```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: [\"select\", \"style\"])```All users overriding the allowed tags by any of the above mechanisms to include both \"select\" and \"style\" should either upgrade or use one of the workarounds immediately.## ReleasesThe FIXED releases are available at the normal locations.## WorkaroundsRemove either `select` or `style` from the overridden allowed tags.## CreditsThis vulnerability was responsibly reported by [windshock](https://hackerone.com/windshock?type=user).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-32209", "url": "https://www.suse.com/security/cve/CVE-2022-32209" }, { "category": "external", "summary": "SUSE Bug 1201183 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1201183" }, { "category": "external", "summary": "SUSE Bug 1206436 for CVE-2022-32209", "url": "https://bugzilla.suse.com/1206436" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.aarch64", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.ppc64le", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.s390x", "openSUSE Tumbleweed:ruby3.1-rubygem-rails-html-sanitizer-1.4.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-32209" } ] }
ghsa-59c7-4xj2-hgvw
Vulnerability from github
Published
2017-10-24 18:33
Modified
2023-01-23 20:38
Severity ?
VLAI Severity ?
Summary
rails-html-sanitizer Cross-site Scripting vulnerability
Details
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
{ "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-7578" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:00:19Z", "nvd_published_at": null, "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "id": "GHSA-59c7-4xj2-hgvw", "modified": "2023-01-23T20:38:10Z", "published": "2017-10-24T18:33:36Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7578" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "type": "WEB", "url": "https://github.com/rails/rails-html-sanitizer" }, { "type": "WEB", "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "type": "WEB", "url": "https://web.archive.org/web/20160128075017/http://www.securitytracker.com/id/1034816" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "rails-html-sanitizer Cross-site Scripting vulnerability" }
wid-sec-w-2025-1085
Vulnerability from csaf_certbund
Published
2016-01-25 23:00
Modified
2025-05-18 22:00
Summary
Ruby on Rails: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Ruby on Rails ist ein in der Programmiersprache Ruby geschriebenes und quelloffenes Web Application Framework.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Ruby on Rails ausnutzen, um Sicherheitsfunktionen zu umgehen, um Dateien zu manipulieren oder um einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Ruby on Rails ist ein in der Programmiersprache Ruby geschriebenes und quelloffenes Web Application Framework.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Ruby on Rails ausnutzen, um Sicherheitsfunktionen zu umgehen, um Dateien zu manipulieren oder um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1085 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2025-1085.json" }, { "category": "self", "summary": "WID-SEC-2025-1085 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1085" }, { "category": "external", "summary": "Weblog Rubyonrails vom 2016-01-25", "url": "http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/" }, { "category": "external", "summary": "Debian Security Advisory DSA-3464 vom 2016-02-01", "url": "http://www.debian.org/security/2016/dsa-3464" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0391-1 vom 2016-02-09", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160391-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0432-1 vom 2016-02-12", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160432-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0435-1 vom 2016-02-12", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160435-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0457-1 vom 2016-02-15", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160457-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0458-1 vom 2016-02-15", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160458-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0456-1 vom 2016-02-15", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160456-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0296 vom 2016-02-25", "url": "https://rhn.redhat.com/errata/RHSA-2016-0296.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0600-1 vom 2016-02-26", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160600-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0598-1 vom 2016-02-26", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160598-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0597-1 vom 2016-02-26", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160597-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0599-1 vom 2016-02-26", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160599-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0619-1 vom 2016-03-01", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160619-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0623-1 vom 2016-03-01", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160623-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0618-1 vom 2016-03-01", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160618-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-3509 vom 2016-03-09", "url": "https://www.debian.org/security/2016/dsa-3509" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:0454 vom 2016-03-16", "url": "https://rhn.redhat.com/errata/RHSA-2016-0454.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0857-1 vom 2016-03-23", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160857-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0858-1 vom 2016-03-23", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160858-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:0968-1 vom 2016-04-07", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20160968-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1146-1 vom 2016-04-25", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "category": "external", "summary": "CXSecurity #WLB-2016100137 vom 2016-10-23", "url": "https://cxsecurity.com/issue/WLB-2016100137" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0475-1 vom 2017-02-16", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170475-1.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:15125-1 vom 2025-05-18", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QQONV4QKIWHRILZMO26H7FGDPO7KJAF/" } ], "source_lang": "en-US", "title": "Ruby on Rails: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-05-18T22:00:00.000+00:00", "generator": { "date": "2025-05-19T08:27:28.505+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-1085", "initial_release_date": "2016-01-25T23:00:00.000+00:00", "revision_history": [ { "date": "2016-01-25T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-01-25T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-01-31T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-01-31T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-02-09T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2016-02-09T23:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2016-02-11T23:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2016-02-14T23:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2016-02-15T23:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2016-02-25T23:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2016-02-25T23:00:00.000+00:00", "number": "11", "summary": "Version nicht vorhanden" }, { "date": "2016-02-28T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-03-01T23:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2016-03-09T23:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2016-03-15T23:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2016-03-23T23:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2016-04-07T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2016-04-25T22:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2016-04-25T22:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2017-02-16T23:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2025-05-18T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von openSUSE aufgenommen" } ], "status": "final", "version": "21" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c4.2.5.1", "product": { "name": "Open Source Ruby on Rails \u003c4.2.5.1", "product_id": "T006926" } }, { "category": "product_version", "name": "4.2.5.1", "product": { "name": "Open Source Ruby on Rails 4.2.5.1", "product_id": "T006926-fixed", "product_identification_helper": { "cpe": "cpe:/a:rubyonrails:ruby_on_rails:4.2.5.1" } } }, { "category": "product_version_range", "name": "\u003c4.1.14.1", "product": { "name": "Open Source Ruby on Rails \u003c4.1.14.1", "product_id": "T006927" } }, { "category": "product_version", "name": "4.1.14.1", "product": { "name": "Open Source Ruby on Rails 4.1.14.1", "product_id": "T006927-fixed", "product_identification_helper": { "cpe": "cpe:/a:rubyonrails:ruby_on_rails:4.1.14.1" } } }, { "category": "product_version_range", "name": "\u003c3.2.22.1", "product": { "name": "Open Source Ruby on Rails \u003c3.2.22.1", "product_id": "T006928" } }, { "category": "product_version", "name": "3.2.22.1", "product": { "name": "Open Source Ruby on Rails 3.2.22.1", "product_id": "T006928-fixed", "product_identification_helper": { "cpe": "cpe:/a:rubyonrails:ruby_on_rails:3.2.22.1" } } } ], "category": "product_name", "name": "Ruby on Rails" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "6", "product": { "name": "Red Hat Enterprise Linux 6", "product_id": "120737", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6" } } }, { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T006054", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server", "product": { "name": "SUSE Linux Enterprise Server", "product_id": "T003320", "product_identification_helper": { "cpe": "cpe:/o:suse:linux_enterprise_server:suseenterprisehighavailabilityextension11sp3" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7576", "product_status": { "known_affected": [ "T003320", "2951", "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7576" }, { "cve": "CVE-2015-7577", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7577" }, { "cve": "CVE-2015-7578", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7578" }, { "cve": "CVE-2015-7579", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7579" }, { "cve": "CVE-2015-7580", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7580" }, { "cve": "CVE-2015-7581", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2015-7581" }, { "cve": "CVE-2016-0751", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2016-0751" }, { "cve": "CVE-2016-0752", "product_status": { "known_affected": [ "T003320", "2951", "T002207", "120737", "T027843", "T006926", "T006054", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2016-0752" }, { "cve": "CVE-2016-0753", "product_status": { "known_affected": [ "T002207", "T027843", "T006926", "T006928", "T006927" ] }, "release_date": "2016-01-25T23:00:00.000+00:00", "title": "CVE-2016-0753" } ] }
gsd-2015-7578
Vulnerability from gsd
Modified
2016-01-25 00:00
Details
There is a possible XSS vulnerability in rails-html-sanitizer. This
vulnerability has been assigned the CVE identifier CVE-2015-7578.
Versions Affected: All.
Not affected: None.
Fixed Versions: 1.0.3
Impact
------
There is a possible XSS vulnerability in rails-html-sanitizer. Certain
attributes are not removed from tags when they are sanitized, and these
attributes can lead to an XSS attack on target applications.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
Releases
--------
The FIXED releases are available at the normal locations.
Workarounds
-----------
There are no feasible workarounds for this issue.
Patches
-------
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 1-0-sanitize_data_attributes.patch - Patch for 1.0 series
Credits
-------
Thanks to Ben Murphy and Marien for reporting this.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-7578", "description": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.", "id": "GSD-2015-7578", "references": [ "https://www.suse.com/security/cve/CVE-2015-7578.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "affected": [ { "package": { "ecosystem": "RubyGems", "name": "rails-html-sanitizer", "purl": "pkg:gem/rails-html-sanitizer" } } ], "aliases": [ "CVE-2015-7578", "GHSA-59c7-4xj2-hgvw" ], "details": "There is a possible XSS vulnerability in rails-html-sanitizer. This\nvulnerability has been assigned the CVE identifier CVE-2015-7578.\n\nVersions Affected: All.\nNot affected: None.\nFixed Versions: 1.0.3\n\nImpact\n------\nThere is a possible XSS vulnerability in rails-html-sanitizer. Certain\nattributes are not removed from tags when they are sanitized, and these\nattributes can lead to an XSS attack on target applications.\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\nReleases\n--------\nThe FIXED releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren\u0027t able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 1-0-sanitize_data_attributes.patch - Patch for 1.0 series\n\nCredits\n-------\nThanks to Ben Murphy and Marien for reporting this.\n", "id": "GSD-2015-7578", "modified": "2016-01-25T00:00:00.000Z", "published": "2016-01-25T00:00:00.000Z", "references": [ { "type": "WEB", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" } ], "schema_version": "1.4.0", "severity": [ { "score": 6.1, "type": "CVSS_V3" } ], "summary": "Possible XSS vulnerability in rails-html-sanitizer" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2016-3a2606f993", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "name": "[oss-security] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4", "refsource": "CONFIRM", "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "name": "1034816", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034816" }, { "name": "[ruby-security-ann] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "name": "FEDORA-2016-59ce8b61dd", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" } ] } }, "github.com/rubysec/ruby-advisory-db": { "cve": "2015-7578", "cvss_v3": 6.1, "date": "2016-01-25", "description": "There is a possible XSS vulnerability in rails-html-sanitizer. This\nvulnerability has been assigned the CVE identifier CVE-2015-7578.\n\nVersions Affected: All.\nNot affected: None.\nFixed Versions: 1.0.3\n\nImpact\n------\nThere is a possible XSS vulnerability in rails-html-sanitizer. Certain\nattributes are not removed from tags when they are sanitized, and these\nattributes can lead to an XSS attack on target applications.\n\nAll users running an affected release should either upgrade or use one of the\nworkarounds immediately.\n\nReleases\n--------\nThe FIXED releases are available at the normal locations.\n\nWorkarounds\n-----------\nThere are no feasible workarounds for this issue.\n\nPatches\n-------\nTo aid users who aren\u0027t able to upgrade immediately we have provided patches for\nthe two supported release series. They are in git-am format and consist of a\nsingle changeset.\n\n* 1-0-sanitize_data_attributes.patch - Patch for 1.0 series\n\nCredits\n-------\nThanks to Ben Murphy and Marien for reporting this.\n", "gem": "rails-html-sanitizer", "ghsa": "59c7-4xj2-hgvw", "patched_versions": [ "\u003e= 1.0.3" ], "title": "Possible XSS vulnerability in rails-html-sanitizer", "url": "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c1.0.3", "affected_versions": "All versions before 1.0.3", "credit": "Ben Murphy and Marien", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-937" ], "date": "2019-08-08", "description": "Certain attributes are not removed from tags when they are sanitized, and these attributes can lead to an XSS attack on target applications.", "fixed_versions": [ "1.0.3" ], "identifier": "CVE-2015-7578", "identifiers": [ "CVE-2015-7578" ], "package_slug": "gem/rails-html-sanitizer", "pubdate": "2016-02-15", "solution": "Upgrade to latest or apply patches.", "title": "Possible XSS vulnerability", "urls": [ "https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI" ], "uuid": "3b3b6384-f229-4780-8031-cc8eaaa39707" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*", "cpe_name": [], "versionEndIncluding": "1.0.2", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1.1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:5.0.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.1:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:a:rubyonrails:rails:4.2.0:beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7578" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/25/11" }, { "name": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4", "refsource": "CONFIRM", "tags": [], "url": "https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4" }, { "name": "[ruby-security-ann] 20160125 [CVE-2015-7578] Possible XSS vulnerability in rails-html-sanitizer", "refsource": "MLIST", "tags": [], "url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ" }, { "name": "SUSE-SU-2016:1146", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html" }, { "name": "FEDORA-2016-3a2606f993", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html" }, { "name": "FEDORA-2016-59ce8b61dd", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html" }, { "name": "openSUSE-SU-2016:0356", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html" }, { "name": "SUSE-SU-2016:0391", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html" }, { "name": "1034816", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1034816" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2019-08-08T15:16Z", "publishedDate": "2016-02-16T02:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…