-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2021-28957 - Medium Severity Vulnerability
Vulnerable Library - lxml-4.5.0-cp36-cp36m-manylinux1_x86_64.whl
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
Library home page: https://files.pythonhosted.org/packages/dd/ba/a0e6866057fc0bbd17192925c1d63a3b85cf522965de9bc02364d08e5b84/lxml-4.5.0-cp36-cp36m-manylinux1_x86_64.whl
Path to dependency file: testplan/requirements.txt
Path to vulnerable library: testplan/requirements.txt,testplan
Dependency Hierarchy:
- ❌ lxml-4.5.0-cp36-cp36m-manylinux1_x86_64.whl (Vulnerable Library)
Vulnerability Details
lxml 4.6.2 allows XSS. It places the HTML action attribute into defs.link_attrs (in html/defs.py) for later use in input sanitization, but does not do the same for the HTML5 formaction attribute.
Publish Date: 2021-03-21
URL: CVE-2021-28957
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28957
Release Date: 2021-03-21
Fix Resolution: 4.6.2
- Check this box to open an automated fix PR