In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://hackerone.com/reports/709009 | third party advisory permissions required |
https://github.com/flavorjones/loofah/issues/171 | third party advisory |
https://www.debian.org/security/2019/dsa-4554 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20191122-0003/ | third party advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/ | vendor advisory |
https://usn.ubuntu.com/4498-1/ | third party advisory vendor advisory |