Описание
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
cert-manager Operator for Red Hat OpenShift | cert-manager/cert-manager-operator-rhel9 | Not affected | ||
Cost Management Metrics Operator | costmanagement/costmanagement-metrics-rhel8-operator | Affected | ||
Logging Subsystem for Red Hat OpenShift | openshift-logging/logging-loki-rhel8 | Not affected | ||
Logical Volume Manager Storage | lvms4/topolvm-rhel9 | Affected | ||
Node Maintenance Operator | workload-availability/node-maintenance-rhel8-operator | Affected | ||
OpenShift Developer Tools and Services | helm | Affected | ||
OpenShift Developer Tools and Services | ocp-tools-4/jenkins-rhel8 | Affected | ||
OpenShift Pipelines | openshift-pipelines-client | Affected | ||
OpenShift Serverless | openshift-serverless-1/client-kn-rhel8 | Will not fix | ||
OpenShift Serverless | openshift-serverless-clients | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
6.1 Medium
CVSS3
Связанные уязвимости
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
The html/template package does not properly handle HTML-like "" commen ...
The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
Уязвимость пакета html/template языка программирования Go, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
EPSS
6.1 Medium
CVSS3