Metrics
Affected Vendors & Products
Tue, 03 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 03 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 02 Dec 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV4_0
|
cvssV4_0
|
Mon, 02 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags for the the "noscript" element. This vulnerability is fixed in 1.6.1. | |
Title | Possible XSS vulnerability with certain configurations of rails-html-sanitizer 1.6.0 | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-02T21:07:04.296Z
Updated: 2024-12-03T14:35:25.922Z
Reserved: 2024-11-25T23:14:36.381Z
Link: CVE-2024-53989
Updated: 2024-12-03T14:35:18.282Z
Status : Received
Published: 2024-12-02T21:15:11.433
Modified: 2024-12-02T22:15:11.740
Link: CVE-2024-53989