Loofah Project Loofah 2.1.0 Release Candidate 2 for Ruby

CPE Details

Loofah Project Loofah 2.1.0 Release Candidate 2 for Ruby
2.1.0
2019-05-08
15h04 +00:00
2019-05-08
15h04 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:loofah_project:loofah:2.1.0:rc2:*:*:*:ruby:*:*

Informations

Vendor

loofah_project

Product

loofah

Version

2.1.0

Update

rc2

Target Software

ruby

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-23518 2022-12-14 16h22 +00:00 rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4.
6.1
Medium
CVE-2022-23515 2022-12-14 13h23 +00:00 Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml media type in data URIs. This issue is patched in version 2.19.1.
6.1
Medium
CVE-2022-23514 2022-12-14 13h19 +00:00 Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
7.5
High
CVE-2019-15587 2019-10-22 18h07 +00:00 In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
5.4
Medium
CVE-2018-16468 2018-10-30 20h00 +00:00 In the Loofah gem for Ruby, through v2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
5.4
Medium
CVE-2018-8048 2018-03-27 15h00 +00:00 In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.
6.1
Medium