Lucene search

K
cve[email protected]CVE-2018-16468
HistoryOct 30, 2018 - 9:29 p.m.

CVE-2018-16468

2018-10-3021:29:00
CWE-79
web.nvd.nist.gov
130
loofah
ruby
nvd
cve-2018-16468
javascript
svg

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

28.1%

In the Loofah gem for Ruby, through v2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.

Affected configurations

NVD
Node
loofah_projectloofahRange2.2.2ruby
Node
debiandebian_linuxMatch9.0
VendorProductVersionCPE
loofah_projectloofahcpe:/a:loofah_project:loofah::::

CNA Affected

[
  {
    "product": "Loofah (Ruby Gem)",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "v2.2.3"
      }
    ]
  }
]

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

28.1%