CVE-2021-43818 - log back

CVE-2021-43818 edited at 04 Apr 2022 22:30:49
Description
+ There's a flaw in python-lxml's HTML Cleaner component, which is responsible for sanitizing HTML and Javascript. An attacker who is able to submit a crafted payload to a web service using python-lxml's HTML Cleaner may be able to trigger script execution in clients such as web browsers. This can occur because the HTML Cleaner did not remove scripts within SVG images in data URLs such as <img src="">. XSS can result in impacts to the integrity and availability of the web page, as well as a potential impact to data confidentiality in some circumstances.
- Prior to python-lxml version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
-
- Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch.
CVE-2021-43818 edited at 13 Dec 2021 19:20:48
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Cross-site scripting
Description
+ Prior to python-lxml version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs.
+
+ Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch.
References
+ https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
+ https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
+ https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
Notes
CVE-2021-43818 created at 13 Dec 2021 19:17:38