OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.oracle.com/security-alerts/cpuoct2021.html | third party advisory patch |
https://github.com/nahsra/antisamy/releases/tag/v1.6.4 | third party advisory patch |
https://github.com/nahsra/antisamy/pull/87 | third party advisory patch |
https://www.oracle.com/security-alerts/cpujan2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpuapr2022.html | third party advisory patch |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |