Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mNXd3LWNxM20tcTNnN84AA0Xi
Sanitize vulnerable to Cross-site Scripting via insufficient neutralization of `style` element content
Impact
Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize >= 3.0.0, < 6.0.2
when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows style
elements and one or more CSS at-rules. This could result in XSS (cross-site scripting) or other undesired behavior when the malicious HTML and CSS are rendered in a browser.
Patches
Sanitize >= 6.0.2
performs additional escaping of CSS in style
element content, which fixes this issue.
Workarounds
Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow style
elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence </
as <\/
in style
element content.
Credit
This issue was found by @cure53 during an audit of a project that uses Sanitize and was reported by one of that project's maintainers. Thank you!
Permalink: https://github.com/advisories/GHSA-f5ww-cq3m-q3g7JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mNXd3LWNxM20tcTNnN84AA0Xi
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 10 months ago
Updated: 5 months ago
CVSS Score: 7.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
Identifiers: GHSA-f5ww-cq3m-q3g7, CVE-2023-36823
References:
- https://github.com/rgrove/sanitize/security/advisories/GHSA-f5ww-cq3m-q3g7
- https://nvd.nist.gov/vuln/detail/CVE-2023-36823
- https://github.com/rgrove/sanitize/commit/76ed46e6dc70820f38efe27de8dabd54dddb5220
- https://github.com/rgrove/sanitize/releases/tag/v6.0.2
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sanitize/CVE-2023-36823.yml
- https://lists.debian.org/debian-lts-announce/2023/11/msg00008.html
- https://github.com/advisories/GHSA-f5ww-cq3m-q3g7
Blast Radius: 28.6
Affected Packages
rubygems:sanitize
Dependent packages: 258Dependent repositories: 10,715
Downloads: 81,947,583 total
Affected Version Ranges: >= 3.0.0, < 6.0.2
Fixed in: 6.0.2
All affected versions: 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.1.0, 3.1.1, 3.1.2, 4.0.0, 4.0.1, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.6.1, 4.6.2, 4.6.3, 4.6.4, 4.6.5, 4.6.6, 5.0.0, 5.1.0, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 6.0.0, 6.0.1
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.1.0, 1.2.0, 1.2.1, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.1.0, 2.1.1, 6.0.2, 6.1.0