The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493 | Patch Third Party Advisory |
https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235 | Third Party Advisory |
https://packagist.org/packages/masterminds/html5 | Third Party Advisory |
https://packagist.org/packages/typo3/html-sanitizer | Product Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-09-13T16:55:10
Updated: 2022-09-13T16:55:10
Reserved: 2022-07-15T00:00:00
Link: CVE-2022-36020
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-13T17:15:08.250
Modified: 2022-09-16T02:36:36.757
Link: CVE-2022-36020
JSON object: View
Redhat Information
No data.
CWE