Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-29400

Опубликовано: 11 мая 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.3

Описание

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

РелизСтатусПримечание
bionic

DNE

devel

not-affected

1.19.9-1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

released

1.19.2-1ubuntu1.1
lunar

released

1.19.8-1ubuntu0.1
trusty

ignored

end of standard support
upstream

needs-triage

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

1.20.4-1
focal

not-affected

1.20.3-1ubuntu0.1~20.04
jammy

not-affected

1.20.3-1ubuntu0.1~22.04
kinetic

DNE

lunar

released

1.20.3-1ubuntu0.1
trusty

ignored

end of standard support
upstream

released

1.20.4-1
xenial

ignored

end of standard support

Показывать по

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
больше 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

CVSS3: 7.3
nvd
больше 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

CVSS3: 7.3
msrc
около 2 месяцев назад

Improper handling of empty HTML attributes in html/template

CVSS3: 7.3
debian
больше 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={ ...

CVSS3: 7.3
github
больше 2 лет назад

Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.

EPSS

Процентиль: 15%
0.00048
Низкий

7.3 High

CVSS3

Уязвимость CVE-2023-29400