Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/ruby-rails-html-sanitizer@1.0.3-2
Typedeb
Namespacedebian
Nameruby-rails-html-sanitizer
Version1.0.3-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.4.4-1
Latest_non_vulnerable_version1.4.4-1
Affected_by_vulnerabilities
0
url VCID-63em-3vdj-j3cu
vulnerability_id VCID-63em-3vdj-j3cu
summary
Inefficient Regular Expression Complexity in rails-html-sanitizer
## Summary

Certain configurations of rails-html-sanitizer `< 1.4.4` use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.


## Mitigation

Upgrade to rails-html-sanitizer `>= 1.4.4`.


## Severity

The maintainers have evaluated this as [High Severity 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).


## References

- [CWE - CWE-1333: Inefficient Regular Expression Complexity (4.9)](https://cwe.mitre.org/data/definitions/1333.html)
- https://hackerone.com/reports/1684163


## Credit

This vulnerability was responsibly reported by @ooooooo-q (https://github.com/ooooooo-q).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23517
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47288
published_at 2026-04-13T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47281
published_at 2026-04-12T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47287
published_at 2026-04-08T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47307
published_at 2026-04-11T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47283
published_at 2026-04-09T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47232
published_at 2026-04-07T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47928
published_at 2026-04-02T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.4795
published_at 2026-04-04T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49008
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23517
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979
6
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23517.yml
8
reference_url https://hackerone.com/reports/1684163
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://hackerone.com/reports/1684163
9
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-02T17:07:58Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23517
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23517
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153720
reference_id 2153720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153720
14
reference_url https://github.com/advisories/GHSA-5x79-w82f-gw8w
reference_id GHSA-5x79-w82f-gw8w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5x79-w82f-gw8w
15
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
aliases CVE-2022-23517, GHSA-5x79-w82f-gw8w, GMS-2022-8298
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-63em-3vdj-j3cu
1
url VCID-782b-usu3-bbhd
vulnerability_id VCID-782b-usu3-bbhd
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways:

- allow both "math" and "style" elements,
- or allow both "svg" and "style" elements

Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways:

1. using application configuration:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "style"]
  # or
  config.action_view.sanitized_allowed_tags = ["svg", "style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "style"] %>
  <%# or %>
  <%= sanitize @comment.body, tags: ["svg", "style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. using Rails::Html::SafeListSanitizer class method `allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["math", "style"]
  # or
  Rails::Html::SafeListSanitizer.allowed_tags = ["svg", "style"]
  ```

4. using a `:tags` options to the Rails::Html::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
  # or
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"])
  ```

All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds immediately.


## Workarounds

Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://hackerone.com/reports/1656627


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34036
published_at 2026-04-13T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-12T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34102
published_at 2026-04-11T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34104
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34073
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-07T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34706
published_at 2026-04-04T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35344
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
7
reference_url https://hackerone.com/reports/1656627
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1656627
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
reference_id 2153744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
13
reference_url https://github.com/advisories/GHSA-9h9g-93gc-623h
reference_id GHSA-9h9g-93gc-623h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9h9g-93gc-623h
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
aliases CVE-2022-23519, GHSA-9h9g-93gc-623h, GMS-2022-8299
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-782b-usu3-bbhd
2
url VCID-ete9-xwuw-puf8
vulnerability_id VCID-ete9-xwuw-puf8
summary
Rails::Html::Sanitizer vulnerable to Cross-site Scripting
Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which  allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted if allowed tags are being overridden. 

This may be done via application configuration: ```ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]```

see https://guides.rubyonrails.org/configuring.html#configuring-action-view

Or it may be done with a `:tags` option to the Action View helper `sanitize`: ```<%= sanitize @comment.body, tags: ["select", "style"] %>``` 

see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize 

It may also be done with Rails::Html::SafeListSanitizer directly: 
```ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]```  or with
```ruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])```

All users overriding the allowed tags by any of the above mechanisms to include both "select" and "style" are recommended to upgrade immediately. A workaround for this issue can be applied by removing either `select` or `style` from the overridden allowed tags.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32209.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32209
reference_id
reference_type
scores
0
value 0.04566
scoring_system epss
scoring_elements 0.89217
published_at 2026-04-16T12:55:00Z
1
value 0.04566
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-13T12:55:00Z
2
value 0.04566
scoring_system epss
scoring_elements 0.89207
published_at 2026-04-12T12:55:00Z
3
value 0.04566
scoring_system epss
scoring_elements 0.89211
published_at 2026-04-11T12:55:00Z
4
value 0.04566
scoring_system epss
scoring_elements 0.892
published_at 2026-04-09T12:55:00Z
5
value 0.04566
scoring_system epss
scoring_elements 0.89196
published_at 2026-04-08T12:55:00Z
6
value 0.04566
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-07T12:55:00Z
7
value 0.04686
scoring_system epss
scoring_elements 0.89321
published_at 2026-04-04T12:55:00Z
8
value 0.04686
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-32209.yml
7
reference_url https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/g/rubyonrails-security/c/ce9PhUANQ6s
8
reference_url https://hackerone.com/reports/1530898
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1530898
9
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/12/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGRLWBEB3S5AU3D4TTROIS7O6QPHDTRH
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NHDACMCLWE32BZZTSNWQPIFUAD5I6Q47
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-32209
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-32209
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013806
reference_id 1013806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013806
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2101882
reference_id 2101882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2101882
18
reference_url https://github.com/advisories/GHSA-pg8v-g4xq-hww9
reference_id GHSA-pg8v-g4xq-hww9
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pg8v-g4xq-hww9
19
reference_url https://access.redhat.com/errata/RHSA-2022:8506
reference_id RHSA-2022:8506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8506
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
aliases CVE-2022-32209, GHSA-pg8v-g4xq-hww9
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ete9-xwuw-puf8
3
url VCID-wxfr-bs81-augc
vulnerability_id VCID-wxfr-bs81-augc
summary
Improper neutralization of data URIs may allow XSS in rails-html-sanitizer
## Summary

rails-html-sanitizer `>= 1.0.3, < 1.4.4` is vulnerable to cross-site scripting via data URIs when used in combination with Loofah `>= 2.1.0`.


## Mitigation

Upgrade to rails-html-sanitizer `>= 1.4.4`.


## Severity

The maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266)
- https://github.com/rails/rails-html-sanitizer/issues/135
- https://hackerone.com/reports/1694173


## Credit

This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23518.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23518
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48625
published_at 2026-04-09T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48629
published_at 2026-04-13T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48616
published_at 2026-04-12T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48643
published_at 2026-04-11T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.4863
published_at 2026-04-08T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48576
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49363
published_at 2026-04-04T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49336
published_at 2026-04-02T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.50478
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/issues/135
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/issues/135
6
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml
8
reference_url https://github.com/w3c/svgwg/issues/266
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/w3c/svgwg/issues/266
9
reference_url https://hackerone.com/reports/1694173
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1694173
10
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23518
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23518
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153701
reference_id 2153701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153701
15
reference_url https://github.com/advisories/GHSA-mcvf-2q2m-x72m
reference_id GHSA-mcvf-2q2m-x72m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mcvf-2q2m-x72m
16
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
aliases CVE-2022-23518, GHSA-mcvf-2q2m-x72m, GMS-2022-8300
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfr-bs81-augc
4
url VCID-xby9-avva-a3e5
vulnerability_id VCID-xby9-avva-a3e5
summary
XSS vulnerability
The gem allows attributes that are not specified in the allowlist to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3741.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3741
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32321
published_at 2026-04-16T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32284
published_at 2026-04-13T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32312
published_at 2026-04-12T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.3235
published_at 2026-04-11T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32349
published_at 2026-04-09T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.3232
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32271
published_at 2026-04-07T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32257
published_at 2026-04-01T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32408
published_at 2026-04-02T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32444
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3741
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae
6
reference_url https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
url https://groups.google.com/d/msg/rubyonrails-security/tP7W3kLc5u4/uDy2Br7xBgAJ
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-3741
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-3741
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1568842
reference_id 1568842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1568842
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893994
reference_id 893994
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893994
10
reference_url https://github.com/advisories/GHSA-px3r-jm9g-c8w8
reference_id GHSA-px3r-jm9g-c8w8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-px3r-jm9g-c8w8
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.0.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.0.4-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-63em-3vdj-j3cu
1
vulnerability VCID-782b-usu3-bbhd
2
vulnerability VCID-ete9-xwuw-puf8
3
vulnerability VCID-wxfr-bs81-augc
4
vulnerability VCID-zcs7-hzze-u3a5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.0.4-1
aliases CVE-2018-3741, GHSA-px3r-jm9g-c8w8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xby9-avva-a3e5
5
url VCID-zcs7-hzze-u3a5
vulnerability_id VCID-zcs7-hzze-u3a5
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements.

Code is only impacted if allowed tags are being overridden using either of the following two mechanisms:

1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["select", "style"]
  ```

  (see https://guides.rubyonrails.org/configuring.html#configuring-action-view)

2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]
  ```

All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.

NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms:

- the `:tags` option to the Action View helper method `sanitize`.
- the `:tags` option to the instance method `SafeListSanitizer#sanitize`.


## Workarounds

Remove either "select" or "style" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
- https://hackerone.com/reports/1654310


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56328
published_at 2026-04-13T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56345
published_at 2026-04-12T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.5637
published_at 2026-04-11T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-16T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.56354
published_at 2026-04-08T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56303
published_at 2026-04-07T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57022
published_at 2026-04-04T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.56999
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
7
reference_url https://hackerone.com/reports/1654310
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1654310
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
reference_id 2153751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
13
reference_url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
reference_id GHSA-rrfc-7g8p-99q8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
0
url pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
purl pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.4.4-1
aliases CVE-2022-23520, GHSA-rrfc-7g8p-99q8, GMS-2022-8301
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcs7-hzze-u3a5
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/ruby-rails-html-sanitizer@1.0.3-2