6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.004 Low
EPSS
Percentile
72.6%
A XSS vulnerability was discovered in python-lxml’s clean module. The module’s parser didn’t properly imitate browsers, which caused different behaviors between the sanitizer and the user’s page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
advisory.checkmarx.net/advisory/CX-2020-4286
bugzilla.redhat.com/show_bug.cgi?id=1901633
github.com/advisories/GHSA-pgww-xf46-h92r
github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7
lists.debian.org/debian-lts-announce/2020/12/msg00028.html
lists.fedoraproject.org/archives/list/[email protected]/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/
lists.fedoraproject.org/archives/list/[email protected]/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/
nvd.nist.gov/vuln/detail/CVE-2020-27783
pypi.org/project/lxml/
security.netapp.com/advisory/ntap-20210521-0003/
snyk.io/vuln/SNYK-PYTHON-LXML-1047473
www.debian.org/security/2020/dsa-4810
www.oracle.com//security-alerts/cpujul2021.html
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.004 Low
EPSS
Percentile
72.6%