Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/tfm-rubygem-rails-html-sanitizer@1.4.4-1?arch=el8sat
Typerpm
Namespaceredhat
Nametfm-rubygem-rails-html-sanitizer
Version1.4.4-1
Qualifiers
arch el8sat
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-782b-usu3-bbhd
vulnerability_id VCID-782b-usu3-bbhd
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags in either of the following ways:

- allow both "math" and "style" elements,
- or allow both "svg" and "style" elements

Code is only impacted if allowed tags are being overridden. Applications may be doing this in four different ways:

1. using application configuration:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["math", "style"]
  # or
  config.action_view.sanitized_allowed_tags = ["svg", "style"]
  ```

  see https://guides.rubyonrails.org/configuring.html#configuring-action-view

2. using a `:tags` option to the Action View helper `sanitize`:

  ```
  <%= sanitize @comment.body, tags: ["math", "style"] %>
  <%# or %>
  <%= sanitize @comment.body, tags: ["svg", "style"] %>
  ```

  see https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitize

3. using Rails::Html::SafeListSanitizer class method `allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["math", "style"]
  # or
  Rails::Html::SafeListSanitizer.allowed_tags = ["svg", "style"]
  ```

4. using a `:tags` options to the Rails::Html::SafeListSanitizer instance method `sanitize`:

  ```ruby
  # instance-level option
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["math", "style"])
  # or
  Rails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["svg", "style"])
  ```

All users overriding the allowed tags by any of the above mechanisms to include (("math" or "svg") and "style") should either upgrade or use one of the workarounds immediately.


## Workarounds

Remove "style" from the overridden allowed tags, or remove "math" and "svg" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://hackerone.com/reports/1656627


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34102
published_at 2026-04-11T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34036
published_at 2026-04-13T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34059
published_at 2026-04-12T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34104
published_at 2026-04-09T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.34073
published_at 2026-04-08T12:55:00Z
5
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-07T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34706
published_at 2026-04-04T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.3468
published_at 2026-04-02T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35333
published_at 2026-04-18T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35281
published_at 2026-04-21T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35344
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23519
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-9h9g-93gc-623h
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23519.yml
7
reference_url https://hackerone.com/reports/1656627
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1656627
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23519
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
reference_id 2153744
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153744
13
reference_url https://github.com/advisories/GHSA-9h9g-93gc-623h
reference_id GHSA-9h9g-93gc-623h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9h9g-93gc-623h
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
aliases CVE-2022-23519, GHSA-9h9g-93gc-623h, GMS-2022-8299
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-782b-usu3-bbhd
1
url VCID-wxfr-bs81-augc
vulnerability_id VCID-wxfr-bs81-augc
summary
Improper neutralization of data URIs may allow XSS in rails-html-sanitizer
## Summary

rails-html-sanitizer `>= 1.0.3, < 1.4.4` is vulnerable to cross-site scripting via data URIs when used in combination with Loofah `>= 2.1.0`.


## Mitigation

Upgrade to rails-html-sanitizer `>= 1.4.4`.


## Severity

The maintainers have evaluated this as [Medium Severity 6.1](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266)
- https://github.com/rails/rails-html-sanitizer/issues/135
- https://hackerone.com/reports/1694173


## Credit

This vulnerability was independently reported by Maciej Piechota (@haqpl) and Mrinmoy Das (@goromlagche).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23518.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23518
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48643
published_at 2026-04-11T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48629
published_at 2026-04-13T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48616
published_at 2026-04-12T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48625
published_at 2026-04-09T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.4863
published_at 2026-04-08T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48576
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49363
published_at 2026-04-04T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49336
published_at 2026-04-02T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.50483
published_at 2026-04-18T12:55:00Z
9
value 0.00269
scoring_system epss
scoring_elements 0.50459
published_at 2026-04-21T12:55:00Z
10
value 0.00269
scoring_system epss
scoring_elements 0.50478
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23518
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/issues/135
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/issues/135
6
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-mcvf-2q2m-x72m
7
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23518.yml
8
reference_url https://github.com/w3c/svgwg/issues/266
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/w3c/svgwg/issues/266
9
reference_url https://hackerone.com/reports/1694173
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1694173
10
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
11
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23518
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23518
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153701
reference_id 2153701
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153701
15
reference_url https://github.com/advisories/GHSA-mcvf-2q2m-x72m
reference_id GHSA-mcvf-2q2m-x72m
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mcvf-2q2m-x72m
16
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
aliases CVE-2022-23518, GHSA-mcvf-2q2m-x72m, GMS-2022-8300
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxfr-bs81-augc
2
url VCID-zcs7-hzze-u3a5
vulnerability_id VCID-zcs7-hzze-u3a5
summary
Possible XSS vulnerability with certain configurations of rails-html-sanitizer
## Summary

There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of CVE-2022-32209.

- Versions affected: ALL
- Not affected: NONE
- Fixed versions: 1.4.4


## Impact

A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements.

Code is only impacted if allowed tags are being overridden using either of the following two mechanisms:

1. Using the Rails configuration `config.action_view.sanitized_allow_tags=`:

  ```ruby
  # In config/application.rb
  config.action_view.sanitized_allowed_tags = ["select", "style"]
  ```

  (see https://guides.rubyonrails.org/configuring.html#configuring-action-view)

2. Using the class method `Rails::Html::SafeListSanitizer.allowed_tags=`:

  ```ruby
  # class-level option
  Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]
  ```

All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately.

NOTE: Code is _not_ impacted if allowed tags are overridden using either of the following mechanisms:

- the `:tags` option to the Action View helper method `sanitize`.
- the `:tags` option to the instance method `SafeListSanitizer#sanitize`.


## Workarounds

Remove either "select" or "style" from the overridden allowed tags.


## References

- [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209
- https://hackerone.com/reports/1654310


## Credit

This vulnerability was responsibly reported by Dominic Breuker.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.5636
published_at 2026-04-18T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56303
published_at 2026-04-07T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56354
published_at 2026-04-08T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56359
published_at 2026-04-16T12:55:00Z
4
value 0.00335
scoring_system epss
scoring_elements 0.5637
published_at 2026-04-11T12:55:00Z
5
value 0.00335
scoring_system epss
scoring_elements 0.56345
published_at 2026-04-12T12:55:00Z
6
value 0.00335
scoring_system epss
scoring_elements 0.56328
published_at 2026-04-21T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57022
published_at 2026-04-04T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.56999
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23520
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23520
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rails/rails-html-sanitizer
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer
5
reference_url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements
1
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rrfc-7g8p-99q8
6
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails-html-sanitizer/CVE-2022-23520.yml
7
reference_url https://hackerone.com/reports/1654310
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/1654310
8
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html
9
reference_url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/09/msg00045.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23520
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
reference_id 1027153
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027153
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
reference_id 2153751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153751
13
reference_url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
reference_id GHSA-rrfc-7g8p-99q8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rrfc-7g8p-99q8
14
reference_url https://access.redhat.com/errata/RHSA-2023:2097
reference_id RHSA-2023:2097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2097
fixed_packages
aliases CVE-2022-23520, GHSA-rrfc-7g8p-99q8, GMS-2022-8301
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcs7-hzze-u3a5
Fixing_vulnerabilities
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tfm-rubygem-rails-html-sanitizer@1.4.4-1%3Farch=el8sat