CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)
Team Summary
Official summary from Internet Bug Bounty
###Summary There is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer. This is due to an incomplete fix of [CVE-2022-32209](https://github.com/advisories/GHSA-pg8v-g4xq-hww9). - Versions affected: ALL - Not affected: NONE - Fixed versions: 1.4.4 ###Impact A possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer has overridden the sanitizer's allowed tags to allow both "select" and "style" elements. Code is only impacted if allowed tags are being overridden using either of the following two mechanisms: 1. Using the Rails configuration ```config.action_view.sanitized_allow_tags=```: ``` #In config/application.rb config.action_view.sanitized_allowed_tags = ["select", "style"] ``` (see https://guides.rubyonrails.org/configuring.html#configuring-action-view) 2. Using the class method Rails::Html::SafeListSanitizer.allowed_tags=: ``` #class-level option Rails::Html::SafeListSanitizer.allowed_tags = ["select", "style"] ``` All users overriding the allowed tags by either of the above mechanisms to include both "select" and "style" should either upgrade or use one of the workarounds immediately. NOTE: Code is not impacted if allowed tags are overridden using either of the following mechanisms: - the ``:tags`` option to the Action View helper method ``sanitize``. - the ``:tags`` option to the instance method ``SafeListSanitizer#sanitize``. ###Workarounds Remove either "select" or "style" from the overridden allowed tags. ###References [CWE - CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (4.9)](https://cwe.mitre.org/data/definitions/79.html) [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32209) https://hackerone.com/reports/1654310
Vulnerability Details
Technical details and impact analysis
Related CVEs
Associated Common Vulnerabilities and Exposures
# Possible XSS Vulnerability in Rails::Html::SanitizerThere is a possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer.This vulnerability has been assigned the CVE identifier CVE-2022-32209.Versions Affected: ALLNot affected: NONEFixed Versions: v1.4.3## ImpactA possible XSS vulnerability with certain configurations of Rails::Html::Sanitizer may allow an attacker to inject content if the application developer …
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Bounty
$2400.00
Submitted
Weakness
Cross-site Scripting (XSS) - Generic