Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-22461
HistoryJan 04, 2023 - 2:57 p.m.

CVE-2023-22461 sanitize-svg Filter Bypass Allows Cross-Site Scripting (XSS)

2023-01-0414:57:04
CWE-80
CWE-79
GitHub_M
www.cve.org
sanitize-svg
filter bypass
cross-site scripting

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

The sanitize-svg package, a small SVG sanitizer to prevent cross-site scripting attacks, uses a deny-list-pattern to sanitize SVGs to prevent XSS. In doing so, literal <script>-tags and on-event handlers were detected in versions prior to 0.4.0. As a result, downstream software that relies on sanitize-svg and expects resulting SVGs to be safe, may be vulnerable to cross-site scripting. This vulnerability was addressed in v0.4.0. There are no known workarounds

CNA Affected

[
  {
    "vendor": "mattkrick",
    "product": "sanitize-svg",
    "versions": [
      {
        "version": "< 0.4",
        "status": "affected"
      }
    ]
  }
]

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.0%

Related for CVELIST:CVE-2023-22461