CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
46.3%
If you have explicitly allowed the <style>
tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the <style>
tag so there is no risk if you have not explicitly allowed the <style>
tag.
The problem has been fixed in version 5.0.372.
Remove the <style>
tag from the set of allowed tags.
If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer
This issue was discovered by Michal Bentkowski of Securitum.
Vendor | Product | Version | CPE |
---|---|---|---|
htmlsanitizer_project | htmlsanitizer | * | cpe:2.3:a:htmlsanitizer_project:htmlsanitizer:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-8j9v-h2vp-2hhv
github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8
github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372
github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv
nvd.nist.gov/vuln/detail/CVE-2020-26293
www.nuget.org/packages/HtmlSanitizer/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
46.3%