
CVE-2022-23518 – Improper neutralization of data URIs allows XSS in rails-html-sanitizer
https://notcve.org/view.php?id=CVE-2022-23518
14 Dec 2022 — rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Versions >= 1.0.3, < 1.4.4 are vulnerable to cross-site scripting via data URIs when used in combination with Loofah >= 2.1.0. This issue is patched in version 1.4.4. rails-html-sanitizer es responsable de sanitizar fragmentos HTML en aplicaciones Rails. Las versiones >= 1.0.3, < 1.4.4 son vulnerables a Cross-Site Scripting (XSS) a través de URI de datos cuando se usan en combinación con Loofah >= 2.1.0. Este p... • https://github.com/rails/rails-html-sanitizer/issues/135 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-23516 – Uncontrolled Recursion in Loofah
https://notcve.org/view.php?id=CVE-2022-23516
14 Dec 2022 — Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.2.0, < 2.19.1 uses recursion for sanitizing CDATA sections, making it susceptible to stack exhaustion and raising a SystemStackError exception. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. Users who are unable to upgrade may be able to mitigate this vulnerability by limiting the length of the strings that are ... • https://github.com/flavorjones/loofah/security/advisories/GHSA-3x8r-x6xp-q4vm • CWE-674: Uncontrolled Recursion •

CVE-2022-23515 – Improper neutralization of data URIs may allow XSS in Loofah
https://notcve.org/view.php?id=CVE-2022-23515
14 Dec 2022 — Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah >= 2.1.0, < 2.19.1 is vulnerable to cross-site scripting via the image/svg+xml media type in data URIs. This issue is patched in version 2.19.1. Loofah es una librería general para manipular y transformar documentos y fragmentos HTML / XML, construida sobre Nokogiri. Loofah >= 2.1.0, < 2.19.1 es vulnerable a Cross-Site Scripting (XSS) a través del tipo de medio image/svg+xml... • https://github.com/flavorjones/loofah/issues/101 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-23514 – Inefficient Regular Expression Complexity in Loofah
https://notcve.org/view.php?id=CVE-2022-23514
14 Dec 2022 — Loofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1. Loofah es una librería general para manipular y transformar documentos y fragmentos HTML / XML, construida sobre Nokogiri... • https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh • CWE-1333: Inefficient Regular Expression Complexity •

CVE-2019-15587 – Ubuntu Security Notice USN-4498-1
https://notcve.org/view.php?id=CVE-2019-15587
22 Oct 2019 — In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. En la gema Loofah para Ruby versiones hasta v2.3.0, un JavaScript no saneado puede aparecer en la salida saneada cuando se vuelve a publicar un elemento SVG diseñado. It was discovered that Loofah does not properly sanitize JavaScript in sanitized output. An attacker could possibly use this issue to perform XSS attacks. • https://github.com/flavorjones/loofah/issues/171 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-16468 – Debian Security Advisory 4364-1
https://notcve.org/view.php?id=CVE-2018-16468
30 Oct 2018 — In the Loofah gem for Ruby, through v2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. En la gema Loofah para Ruby hasta la versión v2.2.2, podría ocurrir JavaScript no saneado en las salidas saneadas cuando se vuelve a publicar un elemento SVG manipulado. It was discovered that ruby-loofah, a general library for manipulating and transforming HTML/XML documents and fragments, performed insufficient sanitising of SVG elements. • https://github.com/flavorjones/loofah/issues/154 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-8048 – rubygem-loofah: XSS vulnerability due to unescaped comments within attributes by libxml2
https://notcve.org/view.php?id=CVE-2018-8048
27 Mar 2018 — In the Loofah gem through 2.2.0 for Ruby, non-whitelisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment. En la gema Loofah hasta la versión 2.2.0 de Ruby, pueden existir atributos HTML que no están incluidos en lista blanca en salidas saneadas al publicar de nuevo un fragmento HTML manipulado. • http://www.openwall.com/lists/oss-security/2018/03/19/5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •