3.5
CVSSv2

CVE-2019-15587

Published: 22/10/2019 Updated: 07/11/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 5.4 | Impact Score: 2.7 | Exploitability Score: 2.3
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

loofah project loofah

fedoraproject fedora 30

fedoraproject fedora 31

canonical ubuntu linux 16.04

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #942894 CVE-2019-15587 Package: ruby-loofah; Maintainer for ruby-loofah is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for ruby-loofah is src:ruby-loofah (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 22 Oct 2 ...
It was discovered that ruby-loofah, a general library for manipulating and transforming HTML/XML documents and fragments, was susceptible to cross-site scripting For the oldstable distribution (stretch), this problem has been fixed in version 203-2+deb9u3 For the stable distribution (buster), this problem has been fixed in version 223-1+deb10 ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: [CVE-2019-15587] Loofah XSS Vulnerability <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Mike Dalessio &lt;m ...