CVE-2023-29400
Improper handling of empty HTML attributes in html/template
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, "attr={{.}}") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.
Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-04-05 CVE Reserved
- 2023-05-11 CVE Published
- 2025-01-24 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-176: Improper Handling of Unicode Encoding
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://go.dev/cl/491617 | 2023-11-07 | |
https://go.dev/issue/59722 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://pkg.go.dev/vuln/GO-2023-1753 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2023-29400 | 2024-05-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2196029 | 2024-05-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.19.9 Search vendor "Golang" for product "Go" and version " < 1.19.9" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | >= 1.20.0 < 1.20.4 Search vendor "Golang" for product "Go" and version " >= 1.20.0 < 1.20.4" | - |
Affected
|