CVE-2018-3741 Medium Severity Vulnerability detected by WhiteSource
mend-bolt-for-github opened this issue · 1 comments
CVE-2018-3741 - Medium Severity Vulnerability
Vulnerable Library - rails-html-sanitizer-1.0.3.gem
HTML sanitization for Rails applications
path: /var/lib/gems/2.3.0/cache/rails-html-sanitizer-1.0.3.gem
Library home page: https://rubygems.org/gems/rails-html-sanitizer-1.0.3.gem
Dependency Hierarchy:
- sass-rails-5.0.4.gem (Root Library)
- railties-5.0.7.1.gem
- actionpack-5.0.7.1.gem
- actionview-5.0.7.1.gem
- ❌ rails-html-sanitizer-1.0.3.gem (Vulnerable Library)
- actionview-5.0.7.1.gem
- actionpack-5.0.7.1.gem
- railties-5.0.7.1.gem
Vulnerability Details
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
Publish Date: 2018-03-30
URL: CVE-2018-3741
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Change files
Origin: rails/rails-html-sanitizer@f3ba1a8
Release Date: 2018-03-22
Fix Resolution: Replace or update the following files: scrubbers.rb, rails-html-sanitizer.gemspec, sanitizer_test.rb
Step up your Open Source Security Game with WhiteSource here