Description
CVE-2020-27783 - Medium Severity Vulnerability
Vulnerable Library - lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl
Powerful and Pythonic XML processing library combining libxml2/libxslt with the ElementTree API.
Library home page: https://files.pythonhosted.org/packages/7a/6b/a3d2d3c3075617edcbfc272d79281e812b1a94dab37923b1d06fdfe2e906/lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl
Path to dependency file: /scrapers/requirements.txt
Path to vulnerable library: /scrapers/requirements.txt
Dependency Hierarchy:
- Scrapy-1.8.2-py2.py3-none-any.whl (Root Library)
- ❌ lxml-4.2.5-cp37-cp37m-manylinux1_x86_64.whl (Vulnerable Library)
Found in HEAD commit: 697936f17c78abdd49ac6dfb47dc9193621ea970
Vulnerability Details
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
Publish Date: 2020-12-03
URL: CVE-2020-27783
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1901633
Release Date: 2020-12-03
Fix Resolution: 4.6.1
Step up your Open Source Security Game with WhiteSource here