CVE-2022-23518: Improper neutralization of data URIs may allow XSS in rails-html-sanitizer
(updated )
rails-html-sanitizer >= 1.0.3, < 1.4.4 is vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0.
References
- github.com/advisories/GHSA-mcvf-2q2m-x72m
- github.com/rails/rails-html-sanitizer
- github.com/rails/rails-html-sanitizer/issues/135
- github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m
- github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml
- github.com/w3c/svgwg/issues/266
- hackerone.com/reports/1694173
- lists.debian.org/debian-lts-announce/2023/09/msg00012.html
- lists.debian.org/debian-lts-announce/2024/09/msg00045.html
- nvd.nist.gov/vuln/detail/CVE-2022-23518
Code Behaviors & Features
Detect and mitigate CVE-2022-23518 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →