
We found results for “”
CVE-2020-26293
Good to know:


Date: January 4, 2021
HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
Language: C#
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version SS.CMS - no_fix;SS.CMS - 6.15.0-beta;SS.CMS - 6.14.41-beta;Ucommerce-for-Kentico - no_fix;AdjustStringProperties - 2.0.0;uCommerce.Umbraco7 - 9.5.0.21245;HtmlSanitizer.NetCore3.1 - no_fix;Ucommerce.Sitefinity - 9.5.0.21245;Ucommerce.Umbraco8 - 9.5.0.21245;HtmlSanitizer - 5.0.372;Liberty.Cable.Frontend - no_fix;Vsa.Framework - no_fix;Ucommerce.Client.WebForms - 9.5.0.21245
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | REQUIRED |
Scope (S): | CHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | PARTIAL |
Availability (A): | NONE |
Additional information: |