OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
References
Link | Resource |
---|---|
https://github.com/nahsra/antisamy/pull/87 | Patch Third Party Advisory |
https://github.com/nahsra/antisamy/releases/tag/v1.6.4 | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2021-07-19 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-35043
Mitre link : CVE-2021-35043
CVE.ORG link : CVE-2021-35043
JSON object : View
Products Affected
antisamy_project
- antisamy
oracle
- banking_party_management
- retail_returns_management
- retail_back_office
- retail_central_office
- middleware_common_libraries_and_tools
- insurance_policy_administration
- banking_enterprise_default_management
- banking_platform
- banking_enterprise_default_managment
netapp
- active_iq_unified_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')