The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.
Path to dependency file: /foxtrot-translator/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
CVE-2023-43643 - Medium Severity Vulnerability
The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.
Library home page: http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project
Path to dependency file: /foxtrot-translator/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar,/home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.4.3/antisamy-1.4.3.jar
Dependency Hierarchy: - hbase-server-1.2.1.jar (Root Library) - esapi-2.1.0.jar - :x: **antisamy-1.4.3.jar** (Vulnerable Library)
Found in HEAD commit: ffb8a6014463ce8aac1bf6e7dc9a23fc4a2a8adc
Found in base branch: master
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
Publish Date: 2023-10-09
URL: CVE-2023-43643
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-43643
Release Date: 2023-10-09
Fix Resolution (org.owasp.antisamy:antisamy): 1.7.4
Direct dependency fix Resolution (org.apache.hbase:hbase-server): 1.2.3