CVE-2021-28957 — Cross-site Scripting in Lxml
Severity
6.1MEDIUMNVD
EPSS
0.5%
top 33.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 21
Latest updateApr 8
Description
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages4 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 33, 34
Patches
🔴Vulnerability Details
4📋Vendor Advisories
5Red Hat
▶
Microsoft▶
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments the Cleaner class does not remove the formaction attribu↗2021-03-09
Debian▶
CVE-2021-28957: lxml - An XSS vulnerability was discovered in python-lxml's clean module versions befor...↗2021