Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-39319

Опубликовано: 08 сент. 2023
Источник: debian
EPSS Низкий

Описание

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
golang-1.21fixed1.21.1-1package
golang-1.20fixed1.20.8-1package
golang-1.19removedpackage
golang-1.19no-dsabookwormpackage
golang-1.15removedpackage
golang-1.15no-dsabullseyepackage
golang-1.11removedpackage
golang-1.11postponedbusterpackage

Примечания

  • https://go.dev/issue/62197

  • https://github.com/golang/go/commit/bbd043ff0d6d59f1a9232d31ecd5eacf6507bf6a (go1.21.1)

  • https://github.com/golang/go/commit/2070531d2f53df88e312edace6c8dfc9686ab2f5 (go1.20.8)

  • https://groups.google.com/g/golang-announce/c/Fm51GRLNRvM

EPSS

Процентиль: 20%
0.00062
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 2 года назад

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

CVSS3: 6.1
redhat
почти 2 года назад

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

CVSS3: 6.1
nvd
почти 2 года назад

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

CVSS3: 6.1
github
почти 2 года назад

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.

CVSS3: 6.1
fstec
почти 2 года назад

Уязвимость пакета html/template языка программирования Go, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

EPSS

Процентиль: 20%
0.00062
Низкий