AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
References
| Link | Resource |
|---|---|
| https://github.com/nahsra/antisamy/releases/tag/v1.7.4 | Patch |
| https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2 | Exploit Mitigation Product Vendor Advisory |
| https://github.com/nahsra/antisamy/releases/tag/v1.7.4 | Patch |
| https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2 | Exploit Mitigation Product Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-10-09 14:15
Updated : 2024-11-21 08:24
NVD link : CVE-2023-43643
Mitre link : CVE-2023-43643
CVE.ORG link : CVE-2023-43643
JSON object : View
Products Affected
antisamy_project
- antisamy
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
