CVE-2020-26293

HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
Configurations

Configuration 1 (hide)

cpe:2.3:a:htmlsanitizer_project:htmlsanitizer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8 - Patch, Third Party Advisory () https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8 - Patch, Third Party Advisory
References () https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372 - Release Notes, Third Party Advisory () https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372 - Release Notes, Third Party Advisory
References () https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv - Third Party Advisory () https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv - Third Party Advisory
References () https://www.nuget.org/packages/HtmlSanitizer/ - Product, Third Party Advisory () https://www.nuget.org/packages/HtmlSanitizer/ - Product, Third Party Advisory

Information

Published : 2021-01-04 19:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26293

Mitre link : CVE-2020-26293

CVE.ORG link : CVE-2020-26293


JSON object : View

Products Affected

htmlsanitizer_project

  • htmlsanitizer
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')