
CVE-2024-23635 – AntiSamy malicious input can provoke XSS when preserving comments
https://notcve.org/view.php?id=CVE-2024-23635
02 Feb 2024 — AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in A... • https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-43643 – mXSS in AntiSamy
https://notcve.org/view.php?id=CVE-2023-43643
09 Oct 2023 — AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as execut... • https://github.com/nahsra/antisamy/releases/tag/v1.7.4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-29577
https://notcve.org/view.php?id=CVE-2022-29577
21 Apr 2022 — OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367. OWASP AntiSamy versiones anteriores a 1.6.7, permite un ataque de tipo XSS por medio de contrabando de etiquetas HTML en contenido STYLE con entrada diseñada. El serializador de salida no codifica correctamente el supuesto contenido de las ho... • https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-28367
https://notcve.org/view.php?id=CVE-2022-28367
21 Apr 2022 — OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. OWASP AntiSamy versiones anteriores a 1.6.6, permite un ataque de tipo XSS por medio de contrabando de etiquetas HTML en contenido STYLE con entrada diseñada. El serializador de salida no codifica apropiadamente el supuesto contenido de las hojas de estilo en cascada (CSS) • https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-28366
https://notcve.org/view.php?id=CVE-2022-28366
21 Apr 2022 — Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839. Algunos analizadores de HTML relacionados con Neko permiten una denegación d... • https://github.com/nahsra/antisamy/releases/tag/v1.6.6 •

CVE-2021-35043
https://notcve.org/view.php?id=CVE-2021-35043
19 Jul 2021 — OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with : as the replacement for the : character. OWASP AntiSamy versiones anteriores a 1.6.4, permite un ataque de tipo XSS por medio de atributos HTML cuando se usa el serializador de salida HTML (XHTML no está afectado). Esto fue demostrado por un javascript: URL con : como reemplazo del carácter • https://github.com/nahsra/antisamy/pull/87 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-14735
https://notcve.org/view.php?id=CVE-2017-14735
25 Sep 2017 — OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL. OWASP AntiSamy hasta la versión 1.5.7 permite que se produzca Cross-Site Scripting (XSS) mediante entidades HTML5, tal y como demuestra el uso de : (:) para construir un javascript: URL. • http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2016-10006
https://notcve.org/view.php?id=CVE-2016-10006
24 Dec 2016 — In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. En OWASP AntiSamy en versiones anteriores a 1.5.5, presentando una entrada especialmente manipulada (una etiqueta que admita estilos con contenido activo), podría eludir las protecciones de la biblioteca y suministrar código ejecutable. El impacto es XSS. • https://github.com/epicosy/VUL4J-60 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •