First published: Tue Dec 13 2022(Updated: )
## Summary Loofah `>= 2.1.0, < 2.19.1` is vulnerable to cross-site scripting via the `image/svg+xml` media type in data URIs. ## Mitigation Upgrade to Loofah `>= 2.19.1`. ## Severity The Loofah maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) - https://hackerone.com/reports/1694173 - https://github.com/flavorjones/loofah/issues/101 ## Credit This vulnerability was responsibly reported by Maciej Piechota (@haqpl).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/loofah | >=2.1.0<2.19.1 | 2.19.1 |
redhat/rubygem-loofah | <0:2.19.1-1.el8 | 0:2.19.1-1.el8 |
Loofah Project Loofah | >=2.1.0<2.19.1 | |
redhat/rubygem-loofah | <2.19.1 | 2.19.1 |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-23515.
CVE-2022-23515 has a severity level of Medium (6.1).
The Loofah software version from 2.1.0 to 2.19.1 is affected by CVE-2022-23515.
You can mitigate CVE-2022-23515 by upgrading to Loofah version 2.19.1 or higher.
You can find more information about CVE-2022-23515 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2022-23515) and the NVD website (https://nvd.nist.gov/vuln/detail/CVE-2022-23515).