From d55ab3d3f92a9243a191024d9d4bfadaa935cfda Mon Sep 17 00:00:00 2001 From: Pariwat Chaichomphu Date: Thu, 24 Oct 2019 17:33:09 +0700 Subject: [PATCH] Bump Loofah version to 2.3.1 Vulnerability CVE-2019-15587 In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished. --- Gemfile.lock | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Gemfile.lock b/Gemfile.lock index a7ff0f8..6a17e69 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -100,7 +100,7 @@ GEM connection_pool (2.2.2) crack (0.4.3) safe_yaml (~> 1.0.0) - crass (1.0.4) + crass (1.0.5) devise (4.7.1) bcrypt (~> 3.0) orm_adapter (~> 0.1) @@ -147,7 +147,7 @@ GEM activesupport (>= 4) railties (>= 4) request_store (~> 1.0) - loofah (2.3.0) + loofah (2.3.1) crass (~> 1.0.2) nokogiri (>= 1.5.9) mail (2.7.1)