A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1901633 | issue tracking patch exploit third party advisory |
https://www.debian.org/security/2020/dsa-4810 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/ | vendor advisory |
https://www.oracle.com//security-alerts/cpujul2021.html | third party advisory patch |
https://advisory.checkmarx.net/advisory/CX-2020-4286 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20210521-0003/ | third party advisory |