<p dir="auto">Bumps <a href="https://github.com/rails/rails-html-sanitizer">rails-html-sanitizer</a> from 1.6.0 to 1.6.1.</p>
<details>
<summary>Release notes</summary>
<p dir="auto"><em>Sourced from <a href="https://github.com/rails/rails-html-sanitizer/releases">rails-html-sanitizer's releases</a>.</em></p>
<blockquote>
<h2 dir="auto">1.6.1 / 2024-12-02</h2>
<p dir="auto">This is a performance and security release which addresses several possible XSS vulnerabilities.</p>
<ul dir="auto">
<li>
<p dir="auto">The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.</p>
<p dir="auto">This change addresses <a title="CVE-2024-53985" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-w8gc-x259-rc7x/hovercard" href="https://github.com/advisories/GHSA-w8gc-x259-rc7x">CVE-2024-53985</a> (<a title="GHSA-w8gc-x259-rc7x" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x">GHSA-w8gc-x259-rc7x</a>).</p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content),
regardless of the <code class="notranslate">prune:</code> option value. Previously, disallowed tags were "stripped" unless the
gem was configured with the <code class="notranslate">prune: true</code> option.</p>
<p dir="auto">The CVEs addressed by this change are:</p>
<ul dir="auto">
<li><a title="CVE-2024-53986" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-638j-pmjw-jq48/hovercard" href="https://github.com/advisories/GHSA-638j-pmjw-jq48">CVE-2024-53986</a> (<a title="GHSA-638j-pmjw-jq48" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48">GHSA-638j-pmjw-jq48</a>)</li>
<li><a title="CVE-2024-53987" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-2x5m-9ch4-qgrr/hovercard" href="https://github.com/advisories/GHSA-2x5m-9ch4-qgrr">CVE-2024-53987</a> (<a title="GHSA-2x5m-9ch4-qgrr" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr">GHSA-2x5m-9ch4-qgrr</a>)</li>
</ul>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to
the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags
are removed from the allow-list.</p>
<p dir="auto">The CVEs addressed by this change are:</p>
<ul dir="auto">
<li><a title="CVE-2024-53988" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-cfjx-w229-hgx5/hovercard" href="https://github.com/advisories/GHSA-cfjx-w229-hgx5">CVE-2024-53988</a> (<a title="GHSA-cfjx-w229-hgx5" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5">GHSA-cfjx-w229-hgx5</a>)</li>
<li>CVE-2024-53989 (<a title="GHSA-rxv5-gxqc-xx8g" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g">GHSA-rxv5-gxqc-xx8g</a>)</li>
</ul>
<p dir="auto">Please note that we <em>may</em> restore support for allowing "noscript" in a future release. We do not
expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal
for these tags.</p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">Improve performance by eliminating needless operations on attributes that are being removed. <a href="https://redirect.github.com/rails/rails-html-sanitizer/issues/188">#188</a></p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
</ul>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p dir="auto"><em>Sourced from <a href="https://github.com/rails/rails-html-sanitizer/blob/main/CHANGELOG.md">rails-html-sanitizer's changelog</a>.</em></p>
<blockquote>
<h2 dir="auto">1.6.1 / 2024-12-02</h2>
<p dir="auto">This is a performance and security release which addresses several possible XSS vulnerabilities.</p>
<ul dir="auto">
<li>
<p dir="auto">The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.</p>
<p dir="auto">This change addresses <a title="CVE-2024-53985" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-w8gc-x259-rc7x/hovercard" href="https://github.com/advisories/GHSA-w8gc-x259-rc7x">CVE-2024-53985</a> (<a title="GHSA-w8gc-x259-rc7x" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-w8gc-x259-rc7x/hovercard" href="https://github.com/advisories/GHSA-w8gc-x259-rc7x">GHSA-w8gc-x259-rc7x</a>).</p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content),
regardless of the <code class="notranslate">prune:</code> option value. Previously, disallowed tags were "stripped" unless the
gem was configured with the <code class="notranslate">prune: true</code> option.</p>
<p dir="auto">The CVEs addressed by this change are:</p>
<ul dir="auto">
<li><a title="CVE-2024-53986" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-638j-pmjw-jq48/hovercard" href="https://github.com/advisories/GHSA-638j-pmjw-jq48">CVE-2024-53986</a> (<a title="GHSA-638j-pmjw-jq48" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-638j-pmjw-jq48/hovercard" href="https://github.com/advisories/GHSA-638j-pmjw-jq48">GHSA-638j-pmjw-jq48</a>)</li>
<li><a title="CVE-2024-53987" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-2x5m-9ch4-qgrr/hovercard" href="https://github.com/advisories/GHSA-2x5m-9ch4-qgrr">CVE-2024-53987</a> (<a title="GHSA-2x5m-9ch4-qgrr" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-2x5m-9ch4-qgrr/hovercard" href="https://github.com/advisories/GHSA-2x5m-9ch4-qgrr">GHSA-2x5m-9ch4-qgrr</a>)</li>
</ul>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to
the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags
are removed from the allow-list.</p>
<p dir="auto">The CVEs addressed by this change are:</p>
<ul dir="auto">
<li><a title="CVE-2024-53988" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-cfjx-w229-hgx5/hovercard" href="https://github.com/advisories/GHSA-cfjx-w229-hgx5">CVE-2024-53988</a> (<a title="GHSA-cfjx-w229-hgx5" data-hovercard-type="advisory" data-hovercard-url="/advisories/GHSA-cfjx-w229-hgx5/hovercard" href="https://github.com/advisories/GHSA-cfjx-w229-hgx5">GHSA-cfjx-w229-hgx5</a>)</li>
<li>CVE-2024-53989 (<a title="GHSA-rxv5-gxqc-xx8g" href="https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g">GHSA-rxv5-gxqc-xx8g</a>)</li>
</ul>
<p dir="auto">Please note that we <em>may</em> restore support for allowing "noscript" in a future release. We do not
expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal
for these tags.</p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
<li>
<p dir="auto">Improve performance by eliminating needless operations on attributes that are being removed. <a href="https://redirect.github.com/rails/rails-html-sanitizer/issues/188">#188</a></p>
<p dir="auto"><em>Mike Dalessio</em></p>
</li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul dir="auto">
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/5e96b19bbb934284e675109851bd82429622bb6e"><code class="notranslate">5e96b19</code></a> version bump to v1.6.1</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/383cc7c17f5a6aafed79adff1c419da31a414878"><code class="notranslate">383cc7c</code></a> doc: update CHANGELOG with assigned CVEs</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/a7b0cfe103ff5d8b17d77fb3660589522dd6bcad"><code class="notranslate">a7b0cfe</code></a> Combine the noscript/mglyph prevention blocks</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/5658335ede931a47d02b8aa4d3b5800bd3184158"><code class="notranslate">5658335</code></a> Merge branch 'h1-2509647-noscript' into flavorjones-2024-security-fixes</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/65fb72f07e875b401bbec479c2a5a3d3b10ad338"><code class="notranslate">65fb72f</code></a> Merge branch 'h1-2519936-mglyph-foster-parenting' into flavorjones-2024-secur...</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/3fe22a8b892361c8463f50f4f4a5d08e299c62a2"><code class="notranslate">3fe22a8</code></a> Merge branch 'h1-2519936-foreign-ns-confusion' into flavorjones-2024-security...</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/d7a94c125209a9611308fbfdb7420a8786d7e80f"><code class="notranslate">d7a94c1</code></a> Merge branch 'h1-2503220-nokogiri-serialization' into flavorjones-2024-securi...</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/3fd6e650f991ce687961da45038b77504114d237"><code class="notranslate">3fd6e65</code></a> doc: update CHANGELOG</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f"><code class="notranslate">1625173</code></a> fix: disallow 'noscript' from safe lists</li>
<li><a href="https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72"><code class="notranslate">a0a3e8b</code></a> fix: disallow 'mglyph' and 'malignmark' from safe lists</li>
<li>Additional commits viewable in <a href="https://github.com/rails/rails-html-sanitizer/compare/v1.6.0...v1.6.1">compare view</a></li>
</ul>
</details>
<br>
<p dir="auto"><a href="https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores"><img src="https://camo.githubusercontent.com/3149ca0b322c0f88426bcce533081586cd95587fe5ef9f8b2a407cda147a14a7/68747470733a2f2f646570656e6461626f742d6261646765732e6769746875626170702e636f6d2f6261646765732f636f6d7061746962696c6974795f73636f72653f646570656e64656e63792d6e616d653d7261696c732d68746d6c2d73616e6974697a6572267061636b6167652d6d616e616765723d62756e646c65722670726576696f75732d76657273696f6e3d312e362e30266e65772d76657273696f6e3d312e362e31" alt="Dependabot compatibility score" data-canonical-src="https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=rails-html-sanitizer&package-manager=bundler&previous-version=1.6.0&new-version=1.6.1" style="max-width: 100%;"></a></p>
<p dir="auto">Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting <code class="notranslate">@dependabot rebase</code>.</p>
<hr>
<details>
<summary>Dependabot commands and options</summary>
<br>
<p dir="auto">You can trigger Dependabot actions by commenting on this PR:</p>
<ul dir="auto">
<li><code class="notranslate">@dependabot rebase</code> will rebase this PR</li>
<li><code class="notranslate">@dependabot recreate</code> will recreate this PR, overwriting any edits that have been made to it</li>
<li><code class="notranslate">@dependabot merge</code> will merge this PR after your CI passes on it</li>
<li><code class="notranslate">@dependabot squash and merge</code> will squash and merge this PR after your CI passes on it</li>
<li><code class="notranslate">@dependabot cancel merge</code> will cancel a previously requested merge and block automerging</li>
<li><code class="notranslate">@dependabot reopen</code> will reopen this PR if it is closed</li>
<li><code class="notranslate">@dependabot close</code> will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually</li>
<li><code class="notranslate">@dependabot show <dependency name> ignore conditions</code> will show all of the ignore conditions of the specified dependency</li>
<li><code class="notranslate">@dependabot ignore this major version</code> will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)</li>
<li><code class="notranslate">@dependabot ignore this minor version</code> will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)</li>
<li><code class="notranslate">@dependabot ignore this dependency</code> will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)<br>
You can disable automated security fix PRs for this repo from the <a href="https://github.com/openstreetmap/openstreetmap-website/network/alerts">Security Alerts page</a>.</li>
</ul>
</details>

<hr>

<h4>You can view, comment on, or merge this pull request online at:</h4>
<p>  <a href='https://github.com/openstreetmap/openstreetmap-website/pull/5369'>https://github.com/openstreetmap/openstreetmap-website/pull/5369</a></p>

<h4>Commit Summary</h4>
<ul>
  <li><a href="https://github.com/openstreetmap/openstreetmap-website/pull/5369/commits/0fb06dbcbde2733aa443c91bea2171e47f6519f9" class="commit-link">0fb06db</a>  Bump rails-html-sanitizer from 1.6.0 to 1.6.1</li>
</ul>

<h4 style="display: inline-block">File Changes </h4> <p style="display: inline-block">(<a href="https://github.com/openstreetmap/openstreetmap-website/pull/5369/files">1 file</a>)</p>
<ul>
  <li>
    <strong>M</strong>
    <a href="https://github.com/openstreetmap/openstreetmap-website/pull/5369/files#diff-89cade48462044ee1b672dc5f4c3ec250fbd29effcd8932096a23c1283c6731f">Gemfile.lock</a>
    (6)
  </li>
</ul>

<h4>Patch Links:</h4>
<ul>
  <li><a href='https://github.com/openstreetmap/openstreetmap-website/pull/5369.patch'>https://github.com/openstreetmap/openstreetmap-website/pull/5369.patch</a></li>
  <li><a href='https://github.com/openstreetmap/openstreetmap-website/pull/5369.diff'>https://github.com/openstreetmap/openstreetmap-website/pull/5369.diff</a></li>
</ul>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">—<br />Reply to this email directly, <a href="https://github.com/openstreetmap/openstreetmap-website/pull/5369">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AAK2OLIMJFSVD2X2773KARL2DTLQ3AVCNFSM6AAAAABS4NHFLWVHI2DSMVQWIX3LMV43ASLTON2WKOZSG4YTGNJQGY4DGMI">unsubscribe</a>.<br />You are receiving this because you are subscribed to this thread.<img src="https://github.com/notifications/beacon/AAK2OLNFCDFHFA35PLV33W32DTLQ3A5CNFSM6AAAAABS4NHFLWWGG33NNVSW45C7OR4XAZNFJFZXG5LFVJRW63LNMVXHIX3JMTHKDPGUB4.gif" height="1" width="1" alt="" /><span style="color: transparent; font-size: 0; display: none; visibility: hidden; overflow: hidden; opacity: 0; width: 0; height: 0; max-width: 0; max-height: 0; mso-hide: all">Message ID: <span><openstreetmap/openstreetmap-website/pull/5369</span><span>@</span><span>github</span><span>.</span><span>com></span></span></p>
<script type="application/ld+json">[
{
"@context": "http://schema.org",
"@type": "EmailMessage",
"potentialAction": {
"@type": "ViewAction",
"target": "https://github.com/openstreetmap/openstreetmap-website/pull/5369",
"url": "https://github.com/openstreetmap/openstreetmap-website/pull/5369",
"name": "View Pull Request"
},
"description": "View this Pull Request on GitHub",
"publisher": {
"@type": "Organization",
"name": "GitHub",
"url": "https://github.com"
}
}
]</script>