points
points copied to clipboard
Bump rails-html-sanitizer from 1.6.0 to 1.6.1
Bumps rails-html-sanitizer from 1.6.0 to 1.6.1.
Release notes
Sourced from rails-html-sanitizer's releases.
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: trueoption.The CVEs addressed by this change are:
- CVE-2024-53986 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
Improve performance by eliminating needless operations on attributes that are being removed. #188
Mike Dalessio
Changelog
Sourced from rails-html-sanitizer's changelog.
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: trueoption.The CVEs addressed by this change are:
- CVE-2024-53986 (GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
Improve performance by eliminating needless operations on attributes that are being removed. #188
Mike Dalessio
Commits
5e96b19version bump to v1.6.1383cc7cdoc: update CHANGELOG with assigned CVEsa7b0cfeCombine the noscript/mglyph prevention blocks5658335Merge branch 'h1-2509647-noscript' into flavorjones-2024-security-fixes65fb72fMerge branch 'h1-2519936-mglyph-foster-parenting' into flavorjones-2024-secur...3fe22a8Merge branch 'h1-2519936-foreign-ns-confusion' into flavorjones-2024-security...d7a94c1Merge branch 'h1-2503220-nokogiri-serialization' into flavorjones-2024-securi...3fd6e65doc: update CHANGELOG1625173fix: disallow 'noscript' from safe listsa0a3e8bfix: disallow 'mglyph' and 'malignmark' from safe lists- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) You can disable automated security fix PRs for this repo from the Security Alerts page.