There is a potential cross-site scripting (XSS) vulnerability that can be exploited via maliciously crafted user data.
Our filter to detect and prevent the use of the javascript: URL scheme in the href attribute of an <a> tag could be bypassed with tab \t or newline \n characters between the characters of the protocol, e.g. java\tscript:.
If you render an <a> tag with an href attribute set to a user-provided link, that link could potentially execute JavaScript when clicked by another user.
a(href: user_profile) { "Profile" }
The best way to mitigate this vulnerability is to update to one of the following versions:
Configuring a Content Security Policy that does not allow <code>unsafe-inline</code> would effectively prevent this vulnerability from being exploited.
{
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-79",
"CWE-87"
],
"nvd_published_at": "2024-04-17T16:15:09Z",
"github_reviewed_at": "2024-04-17T00:20:23Z"
}