First published: Wed Oct 07 2020(Updated: )
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cure53 DOMPurify | <2.0.17 | |
Debian Debian Linux | =9.0 | |
Microsoft Visual Studio 2017 | =15.9 | |
Microsoft Visual Studio 2019 | =16.0 | |
Microsoft Visual Studio 2019 | =16.4 | |
Microsoft Visual Studio 2019 | =16.7 | |
Microsoft Visual Studio 2019 | =16.8 | |
Oracle Application Express | <21.1.0.00.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26870 is a vulnerability in Cure53 DOMPurify before 2.0.17 that allows mutation XSS.
CVE-2020-26870 occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
CVE-2020-26870 has a severity level keyword of 'medium' with a severity value of 6.1.
Cure53 DOMPurify before version 2.0.17, Debian Debian Linux 9.0, Microsoft Visual Studio 2017 version 15.9, Microsoft Visual Studio 2019 versions 16.0, 16.4, 16.7, and 16.8, and Oracle Application Express up to version 21.1.0.00.01 are affected by CVE-2020-26870.
To fix CVE-2020-26870, update Cure53 DOMPurify to version 2.0.17 and follow any additional recommendations from the software vendor.