Description
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1005 | OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript. |
Github GHSA |
GHSA-g8jj-899q-8x3j | Cross-site scripting in json-sanitizer |
References
| Link | Providers |
|---|---|
| https://github.com/OWASP/json-sanitizer/pull/20 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:32:14.557Z
Reserved: 2020-06-09T00:00:00.000Z
Link: CVE-2020-13973
No data.
Status : Modified
Published: 2020-06-09T04:15:10.983
Modified: 2024-11-21T05:02:16.377
Link: CVE-2020-13973
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA