OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
References
Link | Resource |
---|---|
https://github.com/OWASP/json-sanitizer/pull/20 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-06-09T03:51:10
Updated: 2020-06-09T03:51:10
Reserved: 2020-06-09T00:00:00
Link: CVE-2020-13973
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-09T04:15:10.983
Modified: 2020-06-12T17:19:24.280
Link: CVE-2020-13973
JSON object: View
Redhat Information
No data.
CWE