Source: libowasp-antisamy-java Version: 1.7.4-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libowasp-antisamy-java. CVE-2024-23635[0]: | AntiSamy is a library for performing fast, configurable cleansing of | HTML coming from untrusted sources. Prior to 1.7.5, there is a | potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused | by flawed parsing of the HTML being sanitized. To be subject to this | vulnerability the `preserveComments` directive must be enabled in | your policy file. As a result, certain crafty inputs can result in | elements in comment tags being interpreted as executable when using | AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-23635 https://www.cve.org/CVERecord?id=CVE-2024-23635 [1] https://github.com/nahsra/antisamy/security/advisories/GHSA-2mrq-w8pv-5pvq Please adjust the affected versions in the BTS as needed. Regards, Salvatore