Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28957

Опубликовано: 21 мар. 2021
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

A flaw was found in python-lxml. The HTML5 formaction attribute is not input sanitized like the HTML action attribute is which can lead to a Cross-Site Scripting attack (XSS) when an application uses python-lxml to sanitize user inputs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Web applications vulnerable to this flaw, where a XSS attack can be accomplished, are only those that use python-lxml to sanitize HTML input and that allow user data to be placed in the "formaction" attribute of a form button. In Red Hat OpenStack Platform, because the flaw has a lower impact and the package is unlikely to be exploited in the RHOSP environment, no update will be provided at this time for the RHOSP python-lxml package. For Ansible Tower and Ansible Automation Platform, Lowering the impact from Moderate to Low as the vulnerable function i.e. lxml HTML Cleaner and the vulnerable attribute i.e. HTML FormAction are not being used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2lxmlAffected
Red Hat Ansible Tower 3lxmlOut of support scope
Red Hat Enterprise Linux 6python-lxmlOut of support scope
Red Hat Enterprise Linux 7python-lxmlOut of support scope
Red Hat Enterprise Linux 9python-lxmlNot affected
Red Hat OpenStack Platform 10 (Newton)python-lxmlOut of support scope
Red Hat OpenStack Platform 13 (Queens)python-lxmlWill not fix
Red Hat Enterprise Linux 8python27FixedRHSA-2021:415109.11.2021
Red Hat Enterprise Linux 8python-lxmlFixedRHSA-2021:415809.11.2021
Red Hat Enterprise Linux 8python39FixedRHSA-2021:416009.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1941534python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS

EPSS

Процентиль: 65%
0.00491
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

CVSS3: 6.1
nvd
больше 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

CVSS3: 6.1
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 6.1
debian
больше 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module vers ...

suse-cvrf
больше 2 лет назад

Security update for python3-lxml

EPSS

Процентиль: 65%
0.00491
Низкий

6.1 Medium

CVSS3