CVE-2024-23635

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-23635
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23635.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-23635
Aliases
Downstream
Published
2024-02-02T16:32:50Z
Modified
2025-10-15T07:17:32.523477Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
AntiSamy malicious input can provoke XSS when preserving comments
Details

AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the preserveComments directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.

References

Affected packages

Git / github.com/nahsra/antisamy

Affected ranges

Type
GIT
Repo
https://github.com/nahsra/antisamy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.6.3

v1.*

v1.5.10
v1.5.11
v1.5.12
v1.5.13
v1.5.7
v1.5.8
v1.5.9
v1.6.0
v1.6.1
v1.6.2
v1.6.4
v1.6.5
v1.6.6
v1.6.6.1
v1.6.7
v1.6.8
v1.7.0
v1.7.1
v1.7.2
v1.7.3
v1.7.4