CVE-2020-4054

In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerability. When HTML is sanitized using Sanitize's "relaxed" config, or a custom config that allows certain elements, some content in a math or svg element may not be sanitized correctly even if math and svg are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: iframe, math, noembed, noframes, noscript, plaintext, script, style, svg, xmp. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. This has been fixed in 5.2.1.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
GitHub_MCNA
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
sanitize_projectsanitize
3.0.0 ≤
𝑥
< 5.2.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-sanitize
bullseye (security)
5.2.1-2+deb11u1
fixed
bullseye
5.2.1-2+deb11u1
fixed
stretch
not-affected
jessie
not-affected
bookworm
6.0.0-1.1+deb12u1
fixed
bookworm (security)
6.0.0-1.1+deb12u1
fixed
sid
6.0.2-2
fixed
trixie
6.0.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-sanitize
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
Fixed 4.6.6-2.1~0.20.04.1
released
eoan
ignored
bionic
needs-triage
xenial
needs-triage
trusty
dne