Metrics
Affected Vendors & Products
Tue, 03 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 03 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 02 Dec 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV4_0
|
cvssV4_0
|
Mon, 02 Dec 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags where the "math", "mtext", "table", and "style" elements are allowed and either either "mglyph" or "malignmark" are allowed. This vulnerability is fixed in 1.6.1. | |
Title | Possible XSS vulnerability with certain configurations of rails-html-sanitizer 1.6.0 | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-02T21:09:56.440Z
Updated: 2024-12-03T14:34:23.054Z
Reserved: 2024-11-25T23:14:36.381Z
Link: CVE-2024-53988
Updated: 2024-12-03T14:34:18.867Z
Status : Received
Published: 2024-12-02T22:15:11.610
Modified: 2024-12-02T22:15:11.610
Link: CVE-2024-53988