CVE-2020-26293 – htmlsanitizer
Package
Manager: nuget
Name: htmlsanitizer
Vulnerable Version: >=0 <5.0.372
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:N
EPSS: 0.00344 pctl0.56294
Details
XSS in HtmlSanitizer ### Impact If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. ### Patches The problem has been fixed in version 5.0.372. ### Workarounds Remove the `<style>` tag from the set of allowed tags. ### For more information If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer ### Credits This issue was discovered by Michal Bentkowski of Securitum.
Metadata
Created: 2021-01-04T18:22:11Z
Modified: 2021-01-07T22:32:04Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/01/GHSA-8j9v-h2vp-2hhv/GHSA-8j9v-h2vp-2hhv.json
CWE IDs: ["CWE-74", "CWE-79"]
Alternative ID: GHSA-8j9v-h2vp-2hhv
Finding: F008
Auto approve: 1