|
{ |
|
"schema_version": "1.4.0", |
|
"id": "GHSA-g8jj-899q-8x3j", |
|
"modified": "2021-05-13T19:52:04Z", |
|
"published": "2022-02-10T23:04:13Z", |
|
"aliases": [ |
|
"CVE-2020-13973" |
|
], |
|
"summary": "Cross-site scripting in json-sanitizer", |
|
"details": "OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.", |
|
"severity": [ |
|
{ |
|
"type": "CVSS_V3", |
|
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" |
|
} |
|
], |
|
"affected": [ |
|
{ |
|
"package": { |
|
"ecosystem": "Maven", |
|
"name": "com.mikesamuel:json-sanitizer" |
|
}, |
|
"ranges": [ |
|
{ |
|
"type": "ECOSYSTEM", |
|
"events": [ |
|
{ |
|
"introduced": "0" |
|
}, |
|
{ |
|
"fixed": "1.2.1" |
|
} |
|
] |
|
} |
|
] |
|
} |
|
], |
|
"references": [ |
|
{ |
|
"type": "ADVISORY", |
|
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13973" |
|
}, |
|
{ |
|
"type": "WEB", |
|
"url": "https://github.com/OWASP/json-sanitizer/pull/20" |
|
} |
|
], |
|
"database_specific": { |
|
"cwe_ids": [ |
|
"CWE-79" |
|
], |
|
"severity": "MODERATE", |
|
"github_reviewed": true, |
|
"github_reviewed_at": "2021-05-13T19:52:04Z", |
|
"nvd_published_at": "2020-06-09T04:15:00Z" |
|
} |
|
} |