First published: Sun Dec 02 2018(Updated: )
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lxml Lxml | <4.2.5 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
debian/lxml | 4.6.3+dfsg-0.1+deb11u1 4.9.2-1 5.3.0-1 | |
pip/lxml | <4.2.5 | 4.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-19787.
The severity of CVE-2018-19787 is medium with a severity value of 6.1.
The affected software is lxml before version 4.2.5.
To fix the vulnerability in lxml, update to version 4.2.5 or a higher version.
You can find more information about CVE-2018-19787 on the MITRE CVE database: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19787