Debian Security Advisory
DLA-3652-1 ruby-sanitize -- LTS security update
- Date Reported:
- 14 Nov 2023
- Affected Packages:
- ruby-sanitize
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2023-36823.
- More information:
-
It was discovered that there was a potential cross-site scripting (XSS) in ruby-sanitize, a whitelist-based HTML sanitizer.
Using carefully crafted input, an attacker may have be able to sneak arbitrary HTML and CSS through Sanitize when configured to use the built-in
relaxed
config or when using a custom config that allowedstyle
elements and one or more CSS "at"-rules. This could have resulted in cross-site scripting (XSS) or other undesired behavior if the malicious HTML and CSS were then rendered in a browser.- CVE-2023-36823
Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in "relaxed" config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue.
For Debian 10
Buster
, this problem has been fixed in version 4.6.6-2.1~deb10u2.We recommend that you upgrade your ruby-sanitize packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2023-36823