CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
61.6%
An XSS vulnerability was discovered in python-lxml’s clean module versions
before 4.6.3. When disabling the safe_attrs_only and forms arguments, the
Cleaner class does not remove the formaction attribute allowing for JS to
bypass the sanitizer. A remote attacker could exploit this flaw to run
arbitrary JS code on users who interact with incorrectly sanitized HTML.
This issue is patched in lxml 4.6.3.
bugs.launchpad.net/lxml/+bug/1888153
github.com/lxml/lxml/pull/316
github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270
launchpad.net/bugs/cve/CVE-2021-28957
lists.debian.org/debian-lts-announce/2021/03/msg00031.html
nvd.nist.gov/vuln/detail/CVE-2021-28957
security-tracker.debian.org/tracker/CVE-2021-28957
ubuntu.com/security/notices/USN-4896-1
ubuntu.com/security/notices/USN-4896-2
www.cve.org/CVERecord?id=CVE-2021-28957
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
61.6%