Description
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
CVSS vector
AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9Confidentiality: None
Availability: None
Affected Packages4 packages
Also affects: Enterprise Linux 6.0
🔴Vulnerability Details
4GHSAactionpack Cross-site Scripting vulnerability↗2017-10-24 ▶ OSVactionpack Cross-site Scripting vulnerability↗2017-10-24 ▶ CVEListCVE-2013-1855: The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer↗2013-03-19 ▶ OSVCVE-2013-1855: The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer↗2013-03-19 ▶ 📋Vendor Advisories
2Red Hatrubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css↗2013-03-18 ▶ DebianCVE-2013-1855: rails - The sanitize_css method in lib/action_controller/vendor/html-scanner/html/saniti...↗2013 ▶ 💬Community
3BugzillaCVE-2013-1855 CVE-2013-1857 rubygem-actionpack various flaws [epel-5]↗2013-03-21 ▶ BugzillaCVE-2013-1855 CVE-2013-1857 rubygem-actionpack various flaws [fedora-all]↗2013-03-21 ▶ BugzillaCVE-2013-1855 rubygem-actionpack: css_sanitization: XSS vulnerability in sanitize_css↗2013-03-14 ▶