loofah is vulnerable to cross-site scripting (XSS). Unsanitized JavaScript may occur in sanitized output when a malicious SVG element is republished, allowing a remote attacker to inject and execute arbitrary Javascript onto a victim’s browser.
CPE | Name | Operator | Version |
---|---|---|---|
loofah | le | 2.3.0 | |
ruby-loofah:xenial | eq | 2.0.3 | |
loofah | le | 2.3.0 | |
ruby-loofah:xenial | eq | 2.0.3 |
bugzilla.suse.com/show_bug.cgi?id=1154751
github.com/flavorjones/loofah/issues/171
hackerone.com/reports/709009
lists.fedoraproject.org/archives/list/[email protected]/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/
lists.fedoraproject.org/archives/list/[email protected]/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/
security.netapp.com/advisory/ntap-20191122-0003/
usn.ubuntu.com/4498-1/
www.debian.org/security/2019/dsa-4554