CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
73.0%
Severity: Medium
Date : 2020-12-05
CVE-ID : CVE-2020-27783
Package : python-lxml
Type : cross-site scripting
Remote : Yes
Link : https://security.archlinux.org/AVG-1319
The package python-lxml before version 4.6.2-1 is vulnerable to cross-
site scripting.
Upgrade to 4.6.2-1.
The problem has been fixed upstream in version 4.6.2.
None.
A cross-site scripting vulnerability was discovered in python-lxml’s
clean module before version 4.6.2. The module’s parser didn’t properly
imitate browsers, which caused different behaviors between the
sanitizer and the user’s page. A remote attacker could exploit this
flaw to run arbitrary HTML/JS code.
A remote attacker might be able to run arbitrary JavaScript code.
https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7
https://security.archlinux.org/CVE-2020-27783
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | python-lxml | < 4.6.2-1 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
73.0%