First published: Thu Nov 17 2011(Updated: )
OWASP HTML Sanitizer (aka owasp-java-html-sanitizer) before 88, when JavaScript is disabled, allows user-assisted remote attackers to obtain potentially sensitive information via a crafted FORM element within a NOSCRIPT element.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer | <88 | 88 |
OWASP Java HTML Sanitizer | <=83 | |
OWASP Java HTML Sanitizer | =42 | |
OWASP Java HTML Sanitizer | =48 | |
OWASP Java HTML Sanitizer | =50 | |
OWASP Java HTML Sanitizer | =74 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4457 is classified as a medium severity vulnerability.
To fix CVE-2011-4457, upgrade OWASP HTML Sanitizer to version 88 or later.
CVE-2011-4457 allows user-assisted remote attackers to extract potentially sensitive information through crafted FORM elements.
CVE-2011-4457 affects versions of OWASP HTML Sanitizer prior to version 88.
CVE-2011-4457 can be exploited even when JavaScript is disabled in the browser.