ActionView sanitize helper bypass with style and math

Disclosed: 2025-02-06 01:33:59 By mokusou To ibb
Medium
Vulnerability Details
Rails-html-sanitizer, which Rails AtionView also uses fails to sanitize input when `math` and `style` are allowed An example would be as follows; ```ruby <%= sanitize @comment.body, tags: ["math", "style"] %> ``` You could see other patterns/places where this is used in the security advisory. View #2519941 for details. ## Impact Sanitizer bypass that leads to XSS on applications built with it. It also affects applications using Rails Action View's sanitize helper: https://api.rubyonrails.org/v7.2/classes/ActionView/Helpers/SanitizeHelper.html
Actions
View on HackerOne
Report Stats
  • Report ID: 2931636
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report