René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
4.7 KiB
JSON

{
"id": "CVE-2022-36020",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-09-13T17:15:08.250",
"lastModified": "2022-09-16T02:36:36.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "El paquete typo3/html-sanitizer es un saneador de HTML, escrito en PHP, cuyo objetivo es proporcionar un marcado seguro contra ataques de tipo XSS basado en etiquetas, atributos y valores expl\u00edcitamente permitidos. Debido a un problema de an\u00e1lisis en el paquete upstream \"masterminds/html5\", el marcado malicioso usado en una secuencia con comentarios HTML especiales no puede ser filtrado y saneado. Esto permite omitir el mecanismo de tipo cross-site scripting de \"typo3/html-sanitizer\". Este problema ha sido abordado en versiones 1.0.7 y 2.0.16 del paquete \"typo3/html-sanitizer\". Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "1.0.7",
"matchCriteriaId": "18546B22-C9E8-4ED2-BA5D-0E49560F74FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typo3:html_sanitizer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.16",
"matchCriteriaId": "3D409E3E-7553-4BB9-9984-08CED758D516"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://packagist.org/packages/masterminds/html5",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://packagist.org/packages/typo3/html-sanitizer",
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
]
}
]
}