AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.
References
Link | Resource |
---|---|
https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq | Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-02-02 17:15
Updated : 2024-02-10 01:38
NVD link : CVE-2024-23635
Mitre link : CVE-2024-23635
CVE.ORG link : CVE-2024-23635
JSON object : View
Products Affected
antisamy_project
- antisamy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')