Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2010-0028 | Dan Pascu python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element. |
Github GHSA |
GHSA-95jp-77w6-qj52 | Cross-site Scripting in python-cjson |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T01:11:36.064Z
Reserved: 2010-07-02T00:00:00Z
Link: CVE-2009-4924
No data.
Status : Deferred
Published: 2010-07-02T19:30:00.863
Modified: 2025-04-11T00:51:21.963
Link: CVE-2009-4924
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA