Sourced from rails-html-sanitizer's releases.
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:
option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: true
option.The CVEs addressed by this change are:
- CVE-2024-53986 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
Improve performance by eliminating needless operations on attributes that are being removed. #188
Mike Dalessio
Sourced from rails-html-sanitizer's changelog.
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:
option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: true
option.The CVEs addressed by this change are:
- CVE-2024-53986 (GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
Improve performance by eliminating needless operations on attributes that are being removed. #188
Mike Dalessio
5e96b19
version bump to v1.6.1383cc7c
doc: update CHANGELOG with assigned CVEsa7b0cfe
Combine the noscript/mglyph prevention blocks5658335
Merge branch 'h1-2509647-noscript' into
flavorjones-2024-security-fixes65fb72f
Merge branch 'h1-2519936-mglyph-foster-parenting' into
flavorjones-2024-secur...3fe22a8
Merge branch 'h1-2519936-foreign-ns-confusion' into
flavorjones-2024-security...d7a94c1
Merge branch 'h1-2503220-nokogiri-serialization' into
flavorjones-2024-securi...3fd6e65
doc: update CHANGELOG1625173
fix: disallow 'noscript' from safe listsa0a3e8b
fix: disallow 'mglyph' and 'malignmark' from safe lists