First published: Tue Oct 22 2019(Updated: )
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/loofah | <2.3.1 | 2.3.1 |
debian/ruby-loofah | <=2.0.3-1<=2.0.3-2+deb9u2<=2.2.3-1 | 2.3.1+dfsg-1 2.2.3-1+deb10u1 2.0.3-2+deb9u3 |
ubuntu/ruby-loofah | <2.0.3-2+ | 2.0.3-2+ |
debian/ruby-loofah | 2.2.3-1+deb10u1 2.2.3-1+deb10u2 2.7.0+dfsg-1 2.19.1-1 2.22.0-1 | |
Loofah (Ruby Gem) | <=2.3.0 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 | |
Ubuntu | =16.04 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15587 is considered a medium severity vulnerability due to the risk of unsanitized JavaScript executing in sanitized output.
To fix CVE-2019-15587, upgrade the Loofah gem to version 2.3.1 or later.
Versions of Loofah gem through v2.3.0 are affected by CVE-2019-15587.
CVE-2019-15587 is a Cross-Site Scripting (XSS) vulnerability due to improper sanitization of SVG elements.
CVE-2019-15587 affects the Loofah gem for Ruby and related packages in Debian and Ubuntu distributions.