CVE-2018-19787

An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
lxmllxml
𝑥
< 4.2.5
debiandebian_linux
8.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lxml
bullseye (security)
4.6.3+dfsg-0.1+deb11u1
fixed
bullseye
4.6.3+dfsg-0.1+deb11u1
fixed
bookworm
4.9.2-1
fixed
sid
5.3.0-1
fixed
trixie
5.3.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lxml
cosmic
not-affected
bionic
Fixed 4.2.1-1ubuntu0.1
released
xenial
Fixed 3.5.0-1ubuntu0.1
released
trusty
Fixed 3.3.3-1ubuntu0.2
released