Rubysec

Providing security resources for the Ruby community.
Follow us @rubysec or email us via info at rubysec.com

Advisory Archive

Back

---
gem: rails-html-sanitizer
date: 2016-01-25
url: https://groups.google.com/forum/#!topic/rubyonrails-security/uh--W4TDwmI
cve: 2015-7578
title: Possible XSS vulnerability in rails-html-sanitizer
description: "There is a possible XSS vulnerability in rails-html-sanitizer. This
  \nvulnerability has been assigned the CVE identifier CVE-2015-7578. \n\nVersions
  Affected:  All. \nNot affected:       None. \nFixed Versions:     1.0.3 \n\nImpact
  \n------ \nThere is a possible XSS vulnerability in rails-html-sanitizer.  Certain
  \nattributes are not removed from tags when they are sanitized, and these \nattributes
  can lead to an XSS attack on target applications. \n\nAll users running an affected
  release should either upgrade or use one of the \nworkarounds immediately. \n\nReleases
  \n-------- \nThe FIXED releases are available at the normal locations. \n\nWorkarounds
  \n----------- \nThere are no feasible workarounds for this issue. \n\nPatches \n-------
  \nTo aid users who aren't able to upgrade immediately we have provided patches for
  \nthe two supported release series. They are in git-am format and consist of a \nsingle
  changeset. \n\n* 1-0-sanitize_data_attributes.patch - Patch for 1.0 series \n\nCredits
  \n------- \nThanks to Ben Murphy and Marien for reporting this.\n  \n"
patched_versions:
- "~> 1.0.3"