Description
CVE-2021-28957 - Medium Severity Vulnerability
Vulnerable Library - lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
Library home page: https://files.pythonhosted.org/packages/7a/6b/a3d2d3c3075617edcbfc272d79281e812b1a94dab37923b1d06fdfe2e906/lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /scrapers/requirements.txt
Path to vulnerable library: /scrapers/requirements.txt
Dependency Hierarchy:
- Scrapy-1.8.2-py2.py3-none-any.whl (Root Library)
- ❌ lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl (Vulnerable Library)
Found in HEAD commit: 51c25ecb67a2ad16fcee689d0e1dd491f1ccda8b
Vulnerability Details
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.
Publish Date: 2021-03-21
URL: CVE-2021-28957
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-jq4v-f5q6-mjqq
Release Date: 2021-03-21
Fix Resolution: 4.6.3
Step up your Open Source Security Game with WhiteSource here