Rails ActionView sanitize helper bypass leading to XSS using SVG tag.
Team Summary
Official summary from Internet Bug Bounty
###Summary Loofah ``>= 2.1.0, < 2.19.1`` is vulnerable to cross-site scripting via the ``image/svg+xml`` media type in data URIs. ###Mitigation Upgrade to Loofah ``>= 2.19.1.`` ###Severity The Loofah maintainers have evaluated this as [Medium Severity 6.1.](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) ###References [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) [SVG MIME Type (image/svg+xml) is misleading to developers · Issue #266 · w3c/svgwg](https://github.com/w3c/svgwg/issues/266) https://hackerone.com/reports/1694173
Vulnerability Details
Technical details and impact analysis
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$2400.00
Submitted
Weakness
Cross-site Scripting (XSS) - Generic