CVE-2022-23519 — Cross-site Scripting in Rails Rails-html-sanitizer
Severity
6.1MEDIUMNVD
EPSS
0.1%
top 64.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 14
Latest updateJan 4
Description
rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Prior to version 1.4.4, a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways: allow both "math" and "style" elements, or allow both "svg" and "style" elements. Code is only impacted if allowed tags are being overridden. . This issue is …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages4 packages
Also affects: Debian Linux 10.0
🔴Vulnerability Details
3OSV▶
CVE-2022-23519: rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications↗2022-12-14
📋Vendor Advisories
2💬Community
1HackerOne▶
CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style)↗2023-01-04