jsoup is a Java HTML parser, built for HTML editing, cleaning, scraping, and cross-site scripting (XSS) safety. jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control characters will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is then possible. This issue is patched in jsoup 1.15.3. Users should upgrade to this version. Additionally, as the unsanitized input may have been persisted, old content should be cleaned again using the updated version. To remediate this issue without immediately upgrading: - disable `SafeList.preserveRelativeLinks`, which will rewrite input URLs as absolute URLs - ensure an appropriate [Content Security Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) is defined. (This should be used regardless of upgrading, as a defence-in-depth best practice.)
History

Sat, 14 Sep 2024 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat migration Toolkit Runtimes
CPEs cpe:/a:redhat:migration_toolkit_runtimes:1.0::el8
Vendors & Products Redhat
Redhat migration Toolkit Runtimes

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-08-29T00:00:00

Updated: 2024-08-03T09:51:59.964Z

Reserved: 2022-07-15T00:00:00

Link: CVE-2022-36033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2022-08-29T17:15:08.523

Modified: 2022-12-08T03:48:04.673

Link: CVE-2022-36033

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-08-29T00:00:00Z

Links: CVE-2022-36033 - Bugzilla