OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character.
References
Link | Resource |
---|---|
https://github.com/nahsra/antisamy/releases/tag/v1.6.4 | Patch Third Party Advisory |
https://github.com/nahsra/antisamy/pull/87 | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2021.html | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2022.html | Patch Vendor Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2021-07-19 08:15
Updated : 2022-09-12 06:51
NVD link : CVE-2021-35043
Mitre link : CVE-2021-35043
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
oracle
- banking_enterprise_default_management
- banking_enterprise_default_managment
- insurance_policy_administration
- banking_platform
- retail_back_office
- retail_returns_management
- retail_central_office
- banking_party_management
antisamy_project
- antisamy
netapp
- active_iq_unified_manager