Описание
lxml vulnerable to Cross-site Scripting
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2020-27783
- https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7
- https://advisory.checkmarx.net/advisory/CX-2020-4286
- https://bugzilla.redhat.com/show_bug.cgi?id=1901633
- https://github.com/advisories/GHSA-pgww-xf46-h92r
- https://github.com/lxml/lxml
- https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2020-62.yaml
- https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK
- https://pypi.org/project/lxml
- https://security.netapp.com/advisory/ntap-20210521-0003
- https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473
- https://www.debian.org/security/2020/dsa-4810
- https://www.oracle.com//security-alerts/cpujul2021.html
Пакеты
lxml
< 4.6.2
4.6.2
Связанные уязвимости
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
A XSS vulnerability was discovered in python-lxml's clean module. The ...