Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-36033

Опубликовано: 29 авг. 2022
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including javascript: URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default SafeList.preserveRelativeLinks option is enabled, HTML including javascript: URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable SafeList.preserveRelativeLinks, which will rewrite input URLs as absolute URLs - ensure an appropriate Content Security Policy is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.)

A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including javascript: URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default SafeList.preserveRelativeLinks option is enabled, HTML, including javascript: URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
AMQ Clientsorg.jsoup/jsoupNot affected
A-MQ Clients 2org.jsoup/jsoupWill not fix
Cryostat 3org.jsoup/jsoupNot affected
Logging Subsystem for Red Hat OpenShiftorg.jsoup/jsoupAffected
Migration Toolkit for Applications 6org.jsoup/jsoupWill not fix
OpenShift Serverlessorg.jsoup/jsoupNot affected
Red Hat AMQ Broker 7org.jsoup/jsoupNot affected
Red Hat build of Apache Camel 4 for Quarkus 3org.jsoup/jsoupWill not fix
Red Hat build of Apache Camel for Spring Boot 3org.jsoup/jsoupAffected
Red Hat build of Apache Camel for Spring Boot 4org.jsoup/jsoupWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-79
Дефект:
CWE-87
https://bugzilla.redhat.com/show_bug.cgi?id=2127078jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled

EPSS

Процентиль: 73%
0.00819
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 3 года назад

jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/We...

CVSS3: 6.1
nvd
почти 3 года назад

jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/H

CVSS3: 6.1
debian
почти 3 года назад

jsoup is a Java HTML parser, built for HTML editing, cleaning, scrapin ...

suse-cvrf
больше 2 лет назад

Security update for jsoup

CVSS3: 6.1
github
почти 3 года назад

jsoup may not sanitize code injection XSS attempts if SafeList.preserveRelativeLinks is enabled

EPSS

Процентиль: 73%
0.00819
Низкий

6.1 Medium

CVSS3