CVE-2020-26293

HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
Configurations

Configuration 1 (hide)

cpe:2.3:a:htmlsanitizer_project:htmlsanitizer:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-01-04 19:15

Updated : 2021-01-07 20:29


NVD link : CVE-2020-26293

Mitre link : CVE-2020-26293

CVE.ORG link : CVE-2020-26293


JSON object : View

Products Affected

htmlsanitizer_project

  • htmlsanitizer
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')