漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
league/commonmark: DisallowedRawHtml extension bypass via whitespace in HTML tag names
Vulnerability Description
league/commonmark is a PHP Markdown parser. Prior to version 2.8.1, the DisallowedRawHtml extension can be bypassed by inserting a newline, tab, or other ASCII whitespace character between a disallowed HTML tag name and the closing >. For example, <script\n> would pass through unfiltered and be rendered as a valid HTML tag by browsers. This is a cross-site scripting (XSS) vector for any application that relies on this extension to sanitize untrusted user input. All applications using the DisallowedRawHtml extension to process untrusted markdown are affected. Applications that use a dedicated HTML sanitizer (such as HTML Purifier) on the rendered output are not affected. This issue has been patched in version 2.8.1.
CVSS Information
N/A
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
commonmark 跨站脚本漏洞
Vulnerability Description
commonmark是The League of Extraordinary Packages开源的一个高度可扩展的PHP Markdown解析器,完全支持CommonMark和GFM规范。 commonmark 2.8.1之前版本存在跨站脚本漏洞,该漏洞源于DisallowedRawHtml扩展可通过在禁止的HTML标签名和>之间插入换行符等方式被绕过,可能导致跨站脚本攻击。
CVSS Information
N/A
Vulnerability Type
N/A