Michal Bentkowski discovered that ruby-sanitize, a whitelist-based HTML sanitizer, is prone to a HTML sanitization bypass vulnerability when using the relaxed or a custom config allowing certain elements. Content in a or element may not be sanitized correctly even if math and svg are not in the allowlist. For the stable distribution (buster), this problem has been fixed in version 4.6.6-2.1~deb10u1. We recommend that you upgrade your ruby-sanitize packages. For the detailed security status of ruby-sanitize please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-sanitize
Michal Bentkowski discovered that ruby-sanitize, a whitelist-based HTML
sanitizer, is prone to a HTML sanitization bypass vulnerability when
using the relaxed
or a custom config allowing certain elements.
Content in a
For the stable distribution (buster), this problem has been fixed in version 4.6.6-2.1~deb10u1.
We recommend that you upgrade your ruby-sanitize packages.
For the detailed security status of ruby-sanitize please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-sanitize