Lucene search

K
githubGitHub Advisory DatabaseGHSA-4VF6-MQ7W-3HP6
HistoryJun 07, 2024 - 10:09 p.m.

Zend_Filter_StripTags vulnerable to Cross-site Scripting when comments allowed

2024-06-0722:09:17
CWE-79
GitHub Advisory Database
github.com
3
zend_filter_striptags
vulnerability
html comments
cross-site scripting
security
browser

6 Medium

AI Score

Confidence

High

Zend_Filter_StripTags contained an optional setting to allow whitelisting HTML comments in filtered text. Microsoft Internet Explorer and several other browsers allow developers to create conditional functionality via HTML comments, including execution of script events and rendering of additional commented markup. By allowing whitelisting of HTML comments, a malicious user could potentially include XSS exploits within HTML comments that would then be rendered in the final output.

Affected configurations

Vulners
Node
zendframeworkzendframework1Range<1.9.7
OR
zendframeworkzendframework1Range<1.8.5
OR
zendframeworkzendframework1Range<1.7.9

6 Medium

AI Score

Confidence

High