cvelist/2021/26xxx/CVE-2021-26540.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2021-02-01 08:01:08 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-02-08 17:00:48 +00:00
"ID": "CVE-2021-26540",
"STATE": "PUBLIC"
2021-02-01 08:01:08 +00:00
},
2021-02-08 17:00:48 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-02-01 08:01:08 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-02-08 17:00:48 +00:00
"value": "Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the \"allowedIframeHostnames\" option when the \"allowIframeRelativeUrls\" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with \"/\\\\example.com\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26",
"refsource": "MISC",
"name": "https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26"
},
{
"url": "https://github.com/apostrophecms/sanitize-html/pull/460",
"refsource": "MISC",
"name": "https://github.com/apostrophecms/sanitize-html/pull/460"
2021-03-25 23:00:41 +00:00
},
{
"refsource": "MISC",
"name": "https://advisory.checkmarx.net/advisory/CX-2021-4309",
"url": "https://advisory.checkmarx.net/advisory/CX-2021-4309"
2021-02-01 08:01:08 +00:00
}
]
}
}