漏洞信息详情
DOMPurify 跨站脚本漏洞
漏洞简介
DOMPurify是一款使用JavaScript编写的,用于HTML、MathML和SVG的DOM(文档对象模型)。
Cure53 DOMPurify 2.0.17版本存在安全漏洞,该漏洞源于serialize-parse往返并不一定返回原来的DOM树,和一个名称空间可以改变从HTML到MathML,证明了嵌套的表单元素。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
参考网址
来源:MS
链接:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html
来源:MISC
链接:https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d
来源:MISC
链接:https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17
来源:MISC
链接:https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/
来源:msrc.microsoft.com
链接:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17007/CVE-2020-26870
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-qradar-analyst-workflow-add-on-to-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3744/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021072052
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0465
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/DOMPurify-Cross-Site-Scripting-via-Serialize-Parse-Roundtrip-33737
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-26870
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujul2021.html
受影响实体
暂无
补丁
- DOMPurify 跨站脚本漏洞的修复措施<!--2020-10-7-->
还没有评论,来说两句吧...