vladzima/emotnr

CVE-2018-3741 Medium Severity Vulnerability detected by WhiteSource

mend-bolt-for-github opened this issue · 1 comments

CVE-2018-3741 - Medium Severity Vulnerability

Vulnerable Library - rails-html-sanitizer-1.0.3.gem

HTML sanitization for Rails applications

path: /var/lib/gems/2.3.0/cache/rails-html-sanitizer-1.0.3.gem

Library home page: https://rubygems.org/gems/rails-html-sanitizer-1.0.3.gem

Dependency Hierarchy:

  • sass-rails-5.0.4.gem (Root Library)
    • railties-5.0.7.1.gem
      • actionpack-5.0.7.1.gem
        • actionview-5.0.7.1.gem
          • rails-html-sanitizer-1.0.3.gem (Vulnerable Library)

Vulnerability Details

There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.

Publish Date: 2018-03-30

URL: CVE-2018-3741

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Change files

Origin: rails/rails-html-sanitizer@f3ba1a8

Release Date: 2018-03-22

Fix Resolution: Replace or update the following files: scrubbers.rb, rails-html-sanitizer.gemspec, sanitizer_test.rb


Step up your Open Source Security Game with WhiteSource here

Duplicate #6