CVE-2023-38500

Source
https://cve.org/CVERecord?id=CVE-2023-38500
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38500.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-38500
Aliases
Published
2023-07-25T20:59:53.135Z
Modified
2026-02-16T02:52:27.020401Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
By-passing Cross-Site Scripting Protection in HTML Sanitizer
Details

TYPO3 HTML Sanitizer is an HTML sanitizer, written in PHP, aiming to provide cross-site-scripting-safe markup based on explicitly allowed tags, attributes and values. Starting in version 1.0.0 and prior to versions 1.5.1 and 2.1.2, due to an encoding issue in the serialization layer, malicious markup nested in a noscript element was not encoded correctly. noscript is disabled in the default configuration, but might have been enabled in custom scenarios. This allows bypassing the cross-site scripting mechanism of TYPO3 HTML Sanitizer. Versions 1.5.1 and 2.1.2 fix the problem.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/38xxx/CVE-2023-38500.json"
}
References

Affected packages

Git / github.com/typo3/html-sanitizer

Affected ranges

Type
GIT
Repo
https://github.com/typo3/html-sanitizer
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.0.0"
        },
        {
            "fixed": "1.5.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/typo3/html-sanitizer
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.0.0"
        },
        {
            "fixed": "2.1.2"
        }
    ]
}

Affected versions

v2.*
v2.0.0
v2.0.1
v2.0.10
v2.0.11
v2.0.12
v2.0.13
v2.0.14
v2.0.15
v2.0.16
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.1.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38500.json"