|
Message-ID: <CAGJbjKasPtcqfRSrsyg=Ae_oM6xknf9V4qyUoFW6aTsL3rLkaw@mail.gmail.com> Date: Tue, 22 Oct 2019 09:15:06 -0400 From: Mike Dalessio <mike.dalessio@...il.com> To: ruby-security-ann@...glegroups.com, rubyonrails-security@...glegroups.com, oss-security@...ts.openwall.com, loofah-talk@...glegroups.com Subject: [CVE-2019-15587] Loofah XSS Vulnerability Hello all, A *medium* severity vulnerability has been identified and patched in Loofah v2.3.1, which is a dependency of `rails-html-sanitizer`. This issue has been assigned CVE-2019-15587. The public notice can be found here: https://github.com/flavorjones/loofah/issues/171 To save you a click, I've reproduced the contents of the announcement here. --- *# CVE-2019-15587 - Loofah XSS Vulnerability* This issue has been created for public disclosure of an XSS vulnerability that was responsibly reported by https://hackerone.com/vxhex I'd like to thank [HackerOne](https://hackerone.com/loofah) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to the Loofah maintainers. *## Severity* Loofah maintainers have evaluated this as [Medium (CVSS3 6.4)]( https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L ). *## Description* In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. *## Affected Versions* Loofah < v2.3.0 *## Mitigation* Upgrade to Loofah v2.3.1 or later.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.