Lucene search

K
redosRedosROS-20240815-13
HistoryAug 15, 2024 - 12:00 a.m.

ROS-20240815-13

2024-08-1500:00:00
redos.red-soft.ru
5
rails
html sanitizer
configuration
vulnerability
content injection
excessive backtracking
cross-site scripting
remote exploitation
denial of service
loofah

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High

A vulnerability in the configuration implementation of the HTML cleanup tool for Rails Rails Html Sanitizer applications
is related to content injection if the application developer overrides the allowed tags “math” and
“style” or “svg” and “style”. Exploitation of the vulnerability could allow an attacker acting remotely,
conduct cross-site scripting attacks

A vulnerability in the configuration implementation of the HTML cleanup tool for Rails Rails Rails Html Sanitizer applications
is related to excessive backtracking when attempting to clean up certain SVG attributes.
Exploitation of the vulnerability could allow an attacker acting remotely to cause a denial of service

A vulnerability in the configuration implementation of the HTML cleaning tool configuration for Rails Rails Html Sanitizer applications
is related to the use of Rails in conjunction with Loofah. Exploitation of the vulnerability could allow an attacker,
acting remotely, to conduct cross-site scripting attacks

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64rubygem-rails-html-sanitizer< 1.6.0-1UNKNOWN

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.5

Confidence

High