An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2606-1 | lxml security update |
Debian DSA |
DSA-4880-1 | lxml security update |
EUVD |
EUVD-2021-0116 | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3. |
Github GHSA |
GHSA-jq4v-f5q6-mjqq | lxml vulnerable to Cross-Site Scripting |
Ubuntu USN |
USN-4896-1 | lxml vulnerability |
Ubuntu USN |
USN-4896-2 | lxml vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T21:55:12.376Z
Reserved: 2021-03-21T00:00:00
Link: CVE-2021-28957
No data.
Status : Modified
Published: 2021-03-21T05:15:13.367
Modified: 2024-11-21T06:00:26.497
Link: CVE-2021-28957
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN