Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cross-site Scripting in org.owasp.esapi:esapi -- antisamy-esapi.xml configuration file
Vulnerability Description
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library. Prior to version 2.3.0.0, there is a potential for a cross-site scripting vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause "javascript:" URLs to fail to be correctly sanitized. This issue is patched in ESAPI 2.3.0.0. As a workaround, manually edit the **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression. More information about remediation of the vulnerability, including the workaround, is available in the maintainers' release notes and security bulletin.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
OWASP ESAPI 安全漏洞
Vulnerability Description
OWASP ESAPI是一个免费的、开源的、Web 应用程序安全控制库,使程序员可以更轻松地编写风险较低的应用程序。 OWASP ESAPI(OWASP Enterprise Security API)2.3.0.0 之前版本存在安全漏洞,该漏洞源于antisamy-esapi.xml 配置文件中的“onsiteURL”正则表达式不正确,可能导致“javascript:”URL未能正确清理。
CVSS Information
N/A
Vulnerability Type
N/A