Debian dsa-5616 : ruby-sanitize - security update

medium Nessus Plugin ID 190002


The remote Debian host is missing a security-related update.


The remote Debian 11 / 12 host has a package installed that is affected by a vulnerability as referenced in the dsa-5616 advisory.

- Sanitize is an allowlist-based HTML and CSS sanitizer. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML and CSS through Sanitize starting with version 3.0.0 and prior to version 6.0.2 when Sanitize is configured to use the built-in relaxed config or when using a custom config that allows `style` elements and one or more CSS at-rules. This could result in cross-site scripting or other undesired behavior when the malicious HTML and CSS are rendered in a browser. Sanitize 6.0.2 performs additional escaping of CSS in `style` element content, which fixes this issue. Users who are unable to upgrade can prevent this issue by using a Sanitize config that doesn't allow `style` elements, using a Sanitize config that doesn't allow CSS at-rules, or by manually escaping the character sequence `</` as `<\/` in `style` element content. (CVE-2023-36823)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade the ruby-sanitize packages.

See Also

Plugin Details

Severity: Medium

ID: 190002

File Name: debian_DSA-5616.nasl

Version: 1.0

Type: local

Agent: unix

Published: 2/6/2024

Updated: 2/6/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information


Risk Factor: Low

Score: 3.0


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2023-36823


Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:ruby-sanitize, cpe:/o:debian:debian_linux:11.0, cpe:/o:debian:debian_linux:12.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 2/5/2024

Vulnerability Publication Date: 7/6/2023

Reference Information

CVE: CVE-2023-36823