CVE-2023-39319
Improper handling of special tags within script contexts in html/template
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
El paquete html/template no aplica las reglas adecuadas para controlar las ocurrencias de ". Esto puede hacer que el analizador de plantillas considere incorrectamente que los contextos de script se terminan antes de tiempo, lo que provoca que las acciones se escapen incorrectamente. Esto podrĂa aprovecharse para realizar un ataque XSS.
A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-07-27 CVE Reserved
- 2023-09-08 CVE Published
- 2024-09-26 CVE Updated
- 2024-10-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://go.dev/issue/62197 | Issue Tracking | |
https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ | Release Notes | |
https://security.gentoo.org/glsa/202311-09 | ||
https://security.netapp.com/advisory/ntap-20231020-0009 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://go.dev/cl/526157 | 2023-11-25 |
URL | Date | SRC |
---|---|---|
https://pkg.go.dev/vuln/GO-2023-2043 | 2023-11-25 | |
https://access.redhat.com/security/cve/CVE-2023-39319 | 2024-05-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2237773 | 2024-05-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | < 1.20.8 Search vendor "Golang" for product "Go" and version " < 1.20.8" | - |
Affected
| ||||||
Golang Search vendor "Golang" | Go Search vendor "Golang" for product "Go" | >= 1.21.0 < 1.21.1 Search vendor "Golang" for product "Go" and version " >= 1.21.0 < 1.21.1" | - |
Affected
|