CVE-2023-23627

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-23627
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-23627.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-23627
Aliases
Related
Published
2023-01-28T00:15:09Z
Modified
2024-10-12T10:42:12.795121Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Sanitize is an allowlist-based HTML and CSS sanitizer. Versions 5.0.0 and later, prior to 6.0.1, are vulnerable to Cross-site Scripting. When Sanitize is configured with a custom allowlist that allows noscript elements, attackers are able to include arbitrary HTML, resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. The default configurations do not allow noscript elements and are not vulnerable. This issue only affects users who are using a custom config that adds noscript to the element allowlist. This issue has been patched in version 6.0.1. Users who are unable to upgrade can prevent this issue by using one of Sanitize's default configs or by ensuring that their custom config does not include noscript in the element allowlist.

References

Affected packages

Debian:11 / ruby-sanitize

Package

Name
ruby-sanitize
Purl
pkg:deb/debian/ruby-sanitize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.2.1-2
5.2.1-2+deb11u1
5.2.3-1

6.*

6.0.0-1~bpo11+1
6.0.0-1
6.0.0-1.1
6.0.2-1
6.0.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ruby-sanitize

Package

Name
ruby-sanitize
Purl
pkg:deb/debian/ruby-sanitize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.0-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ruby-sanitize

Package

Name
ruby-sanitize
Purl
pkg:deb/debian/ruby-sanitize?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.0-1.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/rgrove/sanitize

Affected ranges

Type
GIT
Repo
https://github.com/rgrove/sanitize
Events

Affected versions

v5.*

v5.0.0
v5.1.0
v5.2.0
v5.2.1
v5.2.2
v5.2.3

v6.*

v6.0.0