MGASA-2023-0169

Source
https://advisories.mageia.org/MGASA-2023-0169.html
Import Source
https://advisories.mageia.org/MGASA-2023-0169.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2023-0169
Related
Published
2023-05-16T19:17:40Z
Modified
2023-05-16T18:10:49Z
Summary
Updated golang packages fix security vulnerability
Details

Angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for injection of unexpected HMTL, if executed with untrusted input. (CVE-2023-24539) Not all valid JavaScript whitespace characters were considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution. (CVE-2023-24540) Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input could result in output that would have unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags. (CVE-2023-29400)

References
Credits

Affected packages

Mageia:8 / golang

Package

Name
golang
Purl
pkg:rpm/mageia/golang?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.19.9-1.mga8

Ecosystem specific

{
    "section": "core"
}