Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 572924 (CVE-2015-7578) - <dev-ruby/rails-html-sanitizer-1.0.3: Possible XSS-Vulnerability
Summary: <dev-ruby/rails-html-sanitizer-1.0.3: Possible XSS-Vulnerability
Status: RESOLVED FIXED
Alias: CVE-2015-7578
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-01-25 22:04 UTC by Manuel Rüger (RETIRED)
Modified: 2016-06-30 11:52 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Manuel Rüger (RETIRED) gentoo-dev 2016-01-25 22:04:55 UTC
The full sanitizer was using Loofah's #text method that automatically
escapes HTML entities. That behavior caused some problems where strings
that were not escaped in the older sanitizer started to be escaped. To
fix these problems we used the #text's `encode_special_chars` option as
`false` that not just skipped the HTML entities escaping but unescaped
already escaped entities.

This introduced a security bug because an attacker can pass escaped HTML
tags that will not be sanitized and will be returned as unescaped HTML
tags.

To fix it properly we introduced a new scrubber that will remove all
tags and keep just the text nodes of these tags without changing how
to escape the string.

CVE-2015-7578
Comment 1 Hans de Graaff gentoo-dev Security 2016-01-26 06:13:52 UTC
dev-ruby/rails-html-sanitizer-1.0.3 is now in the tree. It is not fully backward compatible in its results due to increased security measures, so let's do cleanup after a week to give people who need it a chance to upgrade.
Comment 2 Hans de Graaff gentoo-dev Security 2016-02-06 08:11:25 UTC
Cleanup done.
Comment 3 Aaron Bauman (RETIRED) gentoo-dev 2016-06-30 11:52:19 UTC
GLSA Vote: No