Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-23635

Опубликовано: 02 фев. 2024
Источник: debian
EPSS Низкий

Описание

AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libowasp-antisamy-javaunfixedpackage
libowasp-antisamy-javaignoredtrixiepackage
libowasp-antisamy-javaignoredbookwormpackage
libowasp-antisamy-javano-dsabullseyepackage
libowasp-antisamy-javano-dsabusterpackage

Примечания

  • https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq

EPSS

Процентиль: 37%
0.00156
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 2 лет назад

AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.

CVSS3: 6.1
nvd
около 2 лет назад

AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.

CVSS3: 6.1
github
около 2 лет назад

Malicious input can provoke XSS when preserving comments

CVSS3: 6.1
fstec
около 2 лет назад

Уязвимость библиотеки для выполнения быстрой настраиваемой очистки HTML AntiSamy, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)

EPSS

Процентиль: 37%
0.00156
Низкий