Описание
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\example.com".
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| OpenShift Service Mesh 2.0 | servicemesh-prometheus | Affected | ||
| Red Hat OpenShift Container Platform 4.8 | openshift4/ose-console | Fixed | RHSA-2021:2438 | 27.07.2021 |
| Red Hat OpenShift Container Platform 4.8 | openshift4/ose-thanos-rhel8 | Fixed | RHSA-2021:2438 | 27.07.2021 |
| Red Hat OpenShift Container Platform 4.9 | openshift4/ose-prometheus | Fixed | RHSA-2021:3759 | 18.10.2021 |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\\example.com".
Apostrophe Technologies sanitize-html before 2.3.2 does not properly v ...
5.3 Medium
CVSS3