[ASA-202012-1] python-lxml: cross-site scripting
Remi Gacogne
rgacogne at archlinux.org
Wed Dec 9 18:48:02 UTC 2020
Arch Linux Security Advisory ASA-202012-1
=========================================
Severity: Medium
Date : 2020-12-05
CVE-ID : CVE-2020-27783
Package : python-lxml
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1319
Summary
=======
The package python-lxml before version 4.6.2-1 is vulnerable to cross-
site scripting.
Resolution
==========
Upgrade to 4.6.2-1.
# pacman -Syu "python-lxml>=4.6.2-1"
The problem has been fixed upstream in version 4.6.2.
Workaround
==========
None.
Description
===========
A cross-site scripting vulnerability was discovered in python-lxml's
clean module before version 4.6.2. The module's parser didn't properly
imitate browsers, which caused different behaviors between the
sanitizer and the user's page. A remote attacker could exploit this
flaw to run arbitrary HTML/JS code.
Impact
======
A remote attacker might be able to run arbitrary JavaScript code.
References
==========
https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7
https://security.archlinux.org/CVE-2020-27783
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20201209/8d9963ca/attachment.sig>
More information about the arch-security
mailing list