CWE-Bench-Java / advisory /OWASP__json-sanitizer_CVE-2020-13973_1.2.0.json
claire71's picture
add advisory .json files
f091478 verified
raw
history blame
1.53 kB
{
"schema_version": "1.4.0",
"id": "GHSA-g8jj-899q-8x3j",
"modified": "2021-05-13T19:52:04Z",
"published": "2022-02-10T23:04:13Z",
"aliases": [
"CVE-2020-13973"
],
"summary": "Cross-site scripting in json-sanitizer",
"details": "OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
}
],
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.mikesamuel:json-sanitizer"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.2.1"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973"
},
{
"type": "WEB",
"url": "https://github.com/OWASP/json-sanitizer/pull/20"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": "MODERATE",
"github_reviewed": true,
"github_reviewed_at": "2021-05-13T19:52:04Z",
"nvd_published_at": "2020-06-09T04:15:00Z"
}
}