The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Go

Published: 2023-09-08T16:13:24.063Z

Updated: 2023-09-08T16:13:24.063Z

Reserved: 2023-07-27T17:05:55.186Z


Link: CVE-2023-39318

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-09-08T17:15:27.823

Modified: 2023-11-25T11:15:17.430


Link: CVE-2023-39318

JSON object: View

cve-icon Redhat Information

No data.

CWE