Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 6 Dec 2016 13:56:28 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Cc: Scott Kitterman <scott@...terman.com>
Subject: CVE Request: html5lib: potential cross-site scripting vulnerablity:
 quote attributes that need escaping in legacy browsers

Hi

As found in
https://www.sourceclear.com/registry/security/cross-site-scripting-xss-/python/sid-3068/fix
html5lib fixed a cross-site scripting vulnerability in upstream
version 0.99999999 with commit 

https://github.com/html5lib/html5lib-python/commit/9b8d8eb5afbc066b7fac9390f5ec75e5e8a7cab7

References:

https://github.com/html5lib/html5lib-python/issues/11
https://github.com/html5lib/html5lib-python/issues/12

Question about the CVE assignment for html5lib was raised as well in
https://github.com/mozilla/bleach/issues/229

Could you please assign a CVE to identify this issue?

Regards,
Salvatore

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ