Vulnerability Description
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubyonrails | Html Sanitizer | <= 1.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e23Issue TrackingPatchThird Party Advisory
- https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e23Issue TrackingPatchThird Party Advisory
FAQ
What is CVE-2018-3741?
CVE-2018-3741 is a vulnerability with a CVSS score of 6.1 (MEDIUM). There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with special...
How severe is CVE-2018-3741?
CVE-2018-3741 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3741?
Check the references section above for vendor advisories and patch information. Affected products include: Rubyonrails Html Sanitizer.