Source: libowasp-antisamy-java X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for libowasp-antisamy-java. CVE-2016-10006[0]: | In OWASP AntiSamy before 1.5.5, by submitting a specially crafted | input (a tag that supports style with active content), you could | bypass the library protections and supply executable code. The impact | is XSS. https://github.com/nahsra/antisamy/issues/2 CVE-2017-14735[1]: | OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as | demonstrated by use of : to construct a javascript: URL. https://github.com/nahsra/antisamy/issues/10 CVE-2021-35043[2]: | OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using | the HTML output serializer (XHTML is not affected). This was | demonstrated by a javascript: URL with &#00058 as the replacement | for the : character. https://github.com/nahsra/antisamy/pull/87 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2016-10006 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006 [1] https://security-tracker.debian.org/tracker/CVE-2017-14735 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735 [2] https://security-tracker.debian.org/tracker/CVE-2021-35043 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35043 Please adjust the affected versions in the BTS as needed.