漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
lxml_html_clean: CSS @import Filter Bypass via Unicode Escapes
Vulnerability Description
lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vulnerability Type
对输出编码和转义不恰当
Vulnerability Title
lxml_html_clean 安全漏洞
Vulnerability Description
lxml_html_clean是Fedora Python SIG开源的一个从 lxml.HTML.clean 复制的 HTML 清理功能的单独项目。 lxml_html_clean 0.4.4之前版本存在安全漏洞,该漏洞源于_has_sneaky_javascript方法在检查危险CSS关键字前剥离反斜杠,可能导致CSS Unicode转义序列绕过过滤器。
CVSS Information
N/A
Vulnerability Type
N/A