Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Upgrade: Bump rails-html-sanitizer from 1.6.0 to 1.6.1 (#4868)
Bumps [rails-html-sanitizer](https://github.com/rails/rails-html-sanitizer) from 1.6.0 to 1.6.1. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/rails/rails-html-sanitizer/releases">rails-html-sanitizer's releases</a>.</em></p> <blockquote> <h2>1.6.1 / 2024-12-02</h2> <p>This is a performance and security release which addresses several possible XSS vulnerabilities.</p> <ul> <li> <p>The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.</p> <p>This change addresses CVE-2024-53985 (<a href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x">https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x</a>).</p> <p><em>Mike Dalessio</em></p> </li> <li> <p>Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the <code>prune:</code> option value. Previously, disallowed tags were "stripped" unless the gem was configured with the <code>prune: true</code> option.</p> <p>The CVEs addressed by this change are:</p> <ul> <li>CVE-2024-53986 (<a href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48">https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48</a>)</li> <li>CVE-2024-53987 (<a href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr">https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr</a>)</li> </ul> <p><em>Mike Dalessio</em></p> </li> <li> <p>The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.</p> <p>The CVEs addressed by this change are:</p> <ul> <li>CVE-2024-53988 (<a href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5">https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5</a>)</li> <li>CVE-2024-53989 (<a href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g">https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g</a>)</li> </ul> <p>Please note that we <em>may</em> restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.</p> <p><em>Mike Dalessio</em></p> </li> <li> <p>Improve performance by eliminating needless operations on attributes that are being removed. <a href="https://redirect.github.com/rails/rails-html-sanitizer/issues/188">#188</a></p> <p><em>Mike Dalessio</em></p> </li> </ul> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/rails/rails-html-sanitizer/blob/main/CHANGELOG.md">rails-html-sanitizer's changelog</a>.</em></p> <blockquote> <h2>1.6.1 / 2024-12-02</h2> <p>This is a performance and security release which addresses several possible XSS vulnerabilities.</p> <ul> <li> <p>The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.</p> <p>This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).</p> <p><em>Mike Dalessio</em></p> </li> <li> <p>Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the <code>prune:</code> option value. Previously, disallowed tags were "stripped" unless the gem was configured with the <code>prune: true</code> option.</p> <p>The CVEs addressed by this change are:</p> <ul> <li>CVE-2024-53986 (GHSA-638j-pmjw-jq48)</li> <li>CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)</li> </ul> <p><em>Mike Dalessio</em></p> </li> <li> <p>The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.</p> <p>The CVEs addressed by this change are:</p> <ul> <li>CVE-2024-53988 (GHSA-cfjx-w229-hgx5)</li> <li>CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)</li> </ul> <p>Please note that we <em>may</em> restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.</p> <p><em>Mike Dalessio</em></p> </li> <li> <p>Improve performance by eliminating needless operations on attributes that are being removed. <a href="https://redirect.github.com/rails/rails-html-sanitizer/issues/188">#188</a></p> <p><em>Mike Dalessio</em></p> </li> </ul> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/5e96b19bbb934284e675109851bd82429622bb6e"><code>5e96b19</code></a> version bump to v1.6.1</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/383cc7c17f5a6aafed79adff1c419da31a414878"><code>383cc7c</code></a> doc: update CHANGELOG with assigned CVEs</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/a7b0cfe103ff5d8b17d77fb3660589522dd6bcad"><code>a7b0cfe</code></a> Combine the noscript/mglyph prevention blocks</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/5658335ede931a47d02b8aa4d3b5800bd3184158"><code>5658335</code></a> Merge branch 'h1-2509647-noscript' into flavorjones-2024-security-fixes</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/65fb72f07e875b401bbec479c2a5a3d3b10ad338"><code>65fb72f</code></a> Merge branch 'h1-2519936-mglyph-foster-parenting' into flavorjones-2024-secur...</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/3fe22a8b892361c8463f50f4f4a5d08e299c62a2"><code>3fe22a8</code></a> Merge branch 'h1-2519936-foreign-ns-confusion' into flavorjones-2024-security...</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/d7a94c125209a9611308fbfdb7420a8786d7e80f"><code>d7a94c1</code></a> Merge branch 'h1-2503220-nokogiri-serialization' into flavorjones-2024-securi...</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/3fd6e650f991ce687961da45038b77504114d237"><code>3fd6e65</code></a> doc: update CHANGELOG</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f"><code>1625173</code></a> fix: disallow 'noscript' from safe lists</li> <li><a href="https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72"><code>a0a3e8b</code></a> fix: disallow 'mglyph' and 'malignmark' from safe lists</li> <li>Additional commits viewable in <a href="https://github.com/rails/rails-html-sanitizer/compare/v1.6.0...v1.6.1">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=rails-html-sanitizer&package-manager=bundler&previous-version=1.6.0&new-version=1.6.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/TheOdinProject/theodinproject/network/alerts). </details> Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
- Loading branch information