rubygem-sanitize before version 4.6.3 is vulnerable to a HTML injection vulnerability when used with libxml2 from version 2.9.2. An attacker could exploit this to perfrom a cross-site scripting attack (XSS). External References: https://github.com/rgrove/sanitize/issues/176 http://seclists.org/oss-sec/2018/q1/254 Upstream Patch: https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e
Created rubygem-sanitize tracking bugs for this issue: Affects: fedora-all [bug 1559251]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.