Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-28957

Опубликовано: 21 мар. 2021
Источник: redhat
CVSS3: 6.1

Описание

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

A flaw was found in python-lxml. The HTML5 formaction attribute is not input sanitized like the HTML action attribute is which can lead to a Cross-Site Scripting attack (XSS) when an application uses python-lxml to sanitize user inputs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Web applications vulnerable to this flaw, where a XSS attack can be accomplished, are only those that use python-lxml to sanitize HTML input and that allow user data to be placed in the "formaction" attribute of a form button. In Red Hat OpenStack Platform, because the flaw has a lower impact and the package is unlikely to be exploited in the RHOSP environment, no update will be provided at this time for the RHOSP python-lxml package. For Ansible Tower and Ansible Automation Platform, Lowering the impact from Moderate to Low as the vulnerable function i.e. lxml HTML Cleaner and the vulnerable attribute i.e. HTML FormAction are not being used.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 1.2lxmlAffected
Red Hat Ansible Tower 3lxmlOut of support scope
Red Hat Enterprise Linux 6python-lxmlOut of support scope
Red Hat Enterprise Linux 7python-lxmlOut of support scope
Red Hat Enterprise Linux 9python-lxmlNot affected
Red Hat OpenStack Platform 10 (Newton)python-lxmlOut of support scope
Red Hat OpenStack Platform 13 (Queens)python-lxmlWill not fix
Red Hat Enterprise Linux 8python27FixedRHSA-2021:415109.11.2021
Red Hat Enterprise Linux 8python-lxmlFixedRHSA-2021:415809.11.2021
Red Hat Enterprise Linux 8python39FixedRHSA-2021:416009.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
https://bugzilla.redhat.com/show_bug.cgi?id=1941534python-lxml: Missing input sanitization for formaction HTML5 attributes may lead to XSS

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

CVSS3: 6.1
nvd
около 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.

CVSS3: 6.1
msrc
почти 4 года назад

Описание отсутствует

CVSS3: 6.1
debian
около 4 лет назад

An XSS vulnerability was discovered in python-lxml's clean module vers ...

suse-cvrf
больше 2 лет назад

Security update for python3-lxml

6.1 Medium

CVSS3