Логотип exploitDog
bind:CVE-2023-51652
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-51652

Количество 3

Количество 3

nvd логотип

CVE-2023-51652

около 2 лет назад

OWASP AntiSamy .NET is a library for performing cleansing of HTML coming from untrusted sources. Prior to version 1.2.0, there is a potential for a mutation cross-site scripting (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This is patched in OWASP AntiSamy .NET 1.2.0 and later. See important remediation details in the reference given below. As a workaround, manually edit the AntiSamy policy file (e.g., antisamy.xml) by deleting the `preserveComments` directive or setting its value to `false`, if present. Also it would be useful to make AntiSamy remove the `noscript` tag by adding a line described in the GitHub Security Advisory to the tag definitio

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-8x6f-956f-q43w

около 2 лет назад

OWASP.AntiSamy mXSS when preserving comments

CVSS3: 6.1
EPSS: Низкий
fstec логотип

BDU:2024-04170

около 2 лет назад

Уязвимость парсера HtmlAgilityPack библиотеки для выполнения быстрой настраиваемой очистки HTML AntiSamy, позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-51652

OWASP AntiSamy .NET is a library for performing cleansing of HTML coming from untrusted sources. Prior to version 1.2.0, there is a potential for a mutation cross-site scripting (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This is patched in OWASP AntiSamy .NET 1.2.0 and later. See important remediation details in the reference given below. As a workaround, manually edit the AntiSamy policy file (e.g., antisamy.xml) by deleting the `preserveComments` directive or setting its value to `false`, if present. Also it would be useful to make AntiSamy remove the `noscript` tag by adding a line described in the GitHub Security Advisory to the tag definitio

CVSS3: 6.1
1%
Низкий
около 2 лет назад
github логотип
GHSA-8x6f-956f-q43w

OWASP.AntiSamy mXSS when preserving comments

CVSS3: 6.1
1%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-04170

Уязвимость парсера HtmlAgilityPack библиотеки для выполнения быстрой настраиваемой очистки HTML AntiSamy, позволяющая нарушителю проводить межсайтовые сценарные атаки

CVSS3: 6.1
1%
Низкий
около 2 лет назад

Уязвимостей на страницу