First published: Tue Dec 13 2022(Updated: )
## Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209. - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ## Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden using either of the following two mechanisms: 1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`: ```ruby # In config/application.rb config.action_view.sanitized_allowed_tags = ["select", "style"] ``` (see https://guides.rubyonrails.org/configuring.html#configuring-action-view) 2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`: ```ruby # class-level option Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"] ``` All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately. NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms: - the `:tags` option to the Action View helper method `sanitize`. - the `:tags` option to the instance method `SafeListSanitizer#sanitize`. ## Workarounds Remove either "select" or "style" from the overridden allowed tags. ## References - [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209 - https://hackerone.com/reports/1654310 ## Credit This vulnerability was responsibly reported by Dominic Breuker.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rails-html-sanitizer | <1.4.4 | 1.4.4 |
redhat/rubygem-rails-html-sanitizer | <0:1.4.4-1.el8 | 0:1.4.4-1.el8 |
Rails Html Sanitizer Project Rails Html Sanitizer | <1.4.4 | |
redhat/rubygem-rails-html-sanitizer | <1.4.4 | 1.4.4 |
Rubyonrails Rails Html Sanitizers | <1.4.4 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23520 is a Cross-site scripting vulnerability in rails-html-sanitizer.
Certain configurations of rails-html-sanitizer are affected by CVE-2022-23520.
CVE-2022-23520 has a severity rating of medium.
The CVE-2022-23520 vulnerability can be fixed by updating to version 1.4.4 of rails-html-sanitizer.
You can find more information about CVE-2022-23520 on the CVE website, NVD, GitHub, Bugzilla, and Red Hat's errata page.