Description
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
Published: 2020-06-09
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-1005 OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
Github GHSA Github GHSA GHSA-g8jj-899q-8x3j Cross-site scripting in json-sanitizer
History

No history.

Subscriptions

Owasp Json-sanitizer
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:32:14.557Z

Reserved: 2020-06-09T00:00:00.000Z

Link: CVE-2020-13973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-09T04:15:10.983

Modified: 2024-11-21T05:02:16.377

Link: CVE-2020-13973

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses