HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
References
Link | Resource |
---|---|
https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8 | Patch Third Party Advisory |
https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372 | Release Notes Third Party Advisory |
https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv | Third Party Advisory |
https://www.nuget.org/packages/HtmlSanitizer/ | Product Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-01-04 19:15
Updated : 2021-01-07 20:29
NVD link : CVE-2020-26293
Mitre link : CVE-2020-26293
CVE.ORG link : CVE-2020-26293
JSON object : View
Products Affected
htmlsanitizer_project
- htmlsanitizer