Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-29400

Опубликовано: 11 мая 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.3

Описание

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

1.19.9-1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

released

1.19.2-1ubuntu1.1
lunar

released

1.19.8-1ubuntu0.1
trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

1.20.4-1
esm-infra/focal

DNE

focal was not-affected [1.20.3-1ubuntu0.1~20.04]
focal

not-affected

1.20.3-1ubuntu0.1~20.04
jammy

not-affected

1.20.3-1ubuntu0.1~22.04
kinetic

DNE

lunar

released

1.20.3-1ubuntu0.1
trusty

ignored

end of standard support
upstream

released

1.20.4-1
xenial

ignored

end of standard support

Показывать по

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
около 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

CVSS3: 7.3
nvd
около 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

CVSS3: 7.3
debian
около 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={ ...

CVSS3: 7.3
github
около 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

CVSS3: 7.3
fstec
около 2 лет назад

Уязвимость языка программирования Go, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю внедрить произвольные атрибуты в теги HTML

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Уязвимость CVE-2023-29400