First published: Fri Mar 30 2018(Updated: )
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Html Sanitizer | <=1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-3741.
The severity of CVE-2018-3741 is medium with a CVSS score of 6.1.
The affected software is all versions of the rails-html-sanitizer gem below 1.0.4 for Ruby.
The vulnerability allows non-whitelisted attributes to be present in sanitized output, which can lead to an XSS attack on target applications.
To fix CVE-2018-3741, you should update the rails-html-sanitizer gem to version 1.0.4 or higher.