Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-32209
HistoryJun 24, 2022 - 12:00 a.m.

CVE-2022-32209

2022-06-2400:00:00
ubuntu.com
ubuntu.com
19

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

47.5%

Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible

XSS vulnerability with certain configurations of
Rails::Html::Sanitizer.This vulnerability has been assigned the CVE
identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed
Versions: v1.4.3## ImpactA possible XSS vulnerability with certain
configurations of Rails::Html::Sanitizer may allow an attacker to inject
content if the application developer has overridden the sanitizer’s allowed
tags to allow both select and style elements.Code is only impacted if
allowed tags are being overridden. This may be done via application
configuration:ruby# In config/application.rbconfig.action_view.sanitized_allowed_tags = ["select", "style"]see
https://guides.rubyonrails.org/configuring.html#configuring-action-viewOr
it may be done with a :tags option to the Action View helper
sanitize:<%= sanitize @comment.body, tags: ["select", "style"] %>see
https://api.rubyonrails.org/classes/ActionView/Helpers/SanitizeHelper.html#method-i-sanitizeOr
it may be done with Rails::Html::SafeListSanitizer directly:ruby# class-level optionRails::Html::SafeListSanitizer.allowed_tags = ["select", "style"]orruby# instance-level optionRails::Html::SafeListSanitizer.new.sanitize(@article.body, tags: ["select", "style"])All users overriding the allowed tags by any of the
above mechanisms to include both “select” and “style” should either upgrade
or use one of the workarounds immediately.## ReleasesThe FIXED releases are
available at the normal locations.## WorkaroundsRemove either select or
style from the overridden allowed tags.## CreditsThis vulnerability was
responsibly reported by
windshock.

Bugs

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

47.5%