ActionView sanitize helper bypass with noscript
Medium
Vulnerability Details
Rails-html-sanitizer, which Rails AtionView also uses fails to sanitize input when `noscript` are allowed.
An example would be as follows;
```ruby
<%= sanitize '<noscript><p id="</noscript><script>alert(1)</script>"></noscript>' %>
```
You could see other patterns/places where this is used in the security advisory.
View [#250964](https://hackerone.com/reports/2509647) for details.
## Impact
Sanitizer bypass that leads to XSS on applications built with it.
It also affects applications using Rails Action View's sanitize helper: https://api.rubyonrails.org/v7.2/classes/ActionView/Helpers/SanitizeHelper.html
Actions
View on HackerOneReport Stats
- Report ID: 2931691
- State: Closed
- Substate: resolved
- Upvotes: 1