<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2020-4054</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2020-4054</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>23</Number>
        <Date>2023-02-10T01:17:22Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:36:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-02-10T01:17:22Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2020-4054</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerability. When HTML is sanitized using Sanitize's "relaxed" config, or a custom config that allows certain elements, some content in a math or svg element may not be sanitized correctly even if math and svg are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: iframe, math, noembed, noframes, noscript, plaintext, script, style, svg, xmp. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. This has been fixed in 5.2.1.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15" CPE="cpe:/o:suse:sle-ha:15">SUSE Linux Enterprise High Availability Extension 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1" CPE="cpe:/o:suse:sle-ha:15:sp1">SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP2" CPE="cpe:/o:suse:sle-ha:15:sp2">SUSE Linux Enterprise High Availability Extension 15 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 6-LTSS">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 6-LTSS">
        <FullProductName ProductID="SUSE OpenStack Cloud 6-LTSS" CPE="cpe:/o:suse:suse-openstack-cloud-ltss:6">SUSE OpenStack Cloud 6-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 7">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 7">
        <FullProductName ProductID="SUSE OpenStack Cloud 7" CPE="cpe:/o:suse:suse-openstack-cloud:7">SUSE OpenStack Cloud 7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 8">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:8">SUSE OpenStack Cloud Crowbar 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 9">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 9">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:9">SUSE OpenStack Cloud Crowbar 9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-rails-html-sanitizer">
      <FullProductName ProductID="ruby2.1-rubygem-rails-html-sanitizer">ruby2.1-rubygem-rails-html-sanitizer</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-rails-html-sanitizer">
      <FullProductName ProductID="ruby2.5-rubygem-rails-html-sanitizer">ruby2.5-rubygem-rails-html-sanitizer</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-rails-html-sanitizer">
      <FullProductName ProductID="rubygem-rails-html-sanitizer" CPE="cpe:2.3:a:rubyonrails:html_sanitizer:*:*:*:*:*:ruby:*:*">rubygem-rails-html-sanitizer</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.5-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:ruby2.5-rubygem-rails-html-sanitizer">ruby2.5-rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:ruby2.5-rubygem-rails-html-sanitizer">ruby2.5-rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP1:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.5-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP2:ruby2.5-rubygem-rails-html-sanitizer">ruby2.5-rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15 SP2:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE Linux Enterprise High Availability Extension 15 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 6-LTSS">
      <FullProductName ProductID="SUSE OpenStack Cloud 6-LTSS:ruby2.1-rubygem-rails-html-sanitizer">ruby2.1-rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud 6-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 6-LTSS">
      <FullProductName ProductID="SUSE OpenStack Cloud 6-LTSS:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud 6-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer">ruby2.1-rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 7">
      <FullProductName ProductID="SUSE OpenStack Cloud 7:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud 7</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer">ruby2.1-rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer">ruby2.1-rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-html-sanitizer" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:rubygem-rails-html-sanitizer">rubygem-rails-html-sanitizer as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Sanitize (RubyGem sanitize) greater than or equal to 3.0.0 and less than 5.2.1, there is a cross-site scripting vulnerability. When HTML is sanitized using Sanitize's "relaxed" config, or a custom config that allows certain elements, some content in a math or svg element may not be sanitized correctly even if math and svg are not in the allowlist. You are likely to be vulnerable to this issue if you use Sanitize's relaxed config or a custom config that allows one or more of the following HTML elements: iframe, math, noembed, noframes, noscript, plaintext, script, style, svg, xmp. Using carefully crafted input, an attacker may be able to sneak arbitrary HTML through Sanitize, potentially resulting in XSS (cross-site scripting) or other undesired behavior when that HTML is rendered in a browser. This has been fixed in 5.2.1.</Note>
    </Notes>
    <CVE>CVE-2020-4054</CVE>
    <ProductStatuses>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:ruby2.5-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP1:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP2:ruby2.5-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15 SP2:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ruby2.5-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud 6-LTSS:ruby2.1-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud 6-LTSS:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:ruby2.1-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud 7:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 8:rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-rails-html-sanitizer</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:rubygem-rails-html-sanitizer</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.8</BaseScoreV2>
        <VectorV2>AV:N/AC:M/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.3</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
