OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
References
Link | Resource |
---|---|
https://github.com/nahsra/antisamy/pull/87 | Patch Third Party Advisory |
https://github.com/nahsra/antisamy/releases/tag/v1.6.4 | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
https://github.com/nahsra/antisamy/pull/87 | Patch Third Party Advisory |
https://github.com/nahsra/antisamy/releases/tag/v1.6.4 | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 06:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nahsra/antisamy/pull/87 - Patch, Third Party Advisory | |
References | () https://github.com/nahsra/antisamy/releases/tag/v1.6.4 - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
Information
Published : 2021-07-19 15:15
Updated : 2024-11-21 06:11
NVD link : CVE-2021-35043
Mitre link : CVE-2021-35043
CVE.ORG link : CVE-2021-35043
JSON object : View
Products Affected
antisamy_project
- antisamy
oracle
- banking_enterprise_default_management
- banking_party_management
- retail_back_office
- insurance_policy_administration
- banking_platform
- middleware_common_libraries_and_tools
- banking_enterprise_default_managment
- retail_central_office
- retail_returns_management
netapp
- active_iq_unified_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')