Описание
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 4.2.1-1ubuntu0.4 |
devel | not-affected | 4.6.3-1 |
esm-infra-legacy/trusty | not-affected | 3.3.3-1ubuntu0.2+esm3 |
esm-infra/bionic | not-affected | 4.2.1-1ubuntu0.4 |
esm-infra/focal | not-affected | 4.5.0-1ubuntu0.3 |
esm-infra/xenial | not-affected | 3.5.0-1ubuntu0.4 |
focal | released | 4.5.0-1ubuntu0.3 |
groovy | released | 4.5.2-1ubuntu0.4 |
precise/esm | ignored | |
trusty | ignored | end of standard support |
Показывать по
Ссылки на источники
4.3 Medium
CVSS2
6.1 Medium
CVSS3
Связанные уязвимости
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
An XSS vulnerability was discovered in python-lxml's clean module vers ...
4.3 Medium
CVSS2
6.1 Medium
CVSS3