Description
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
References (5)
Core 5
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3841-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3841-2/
Patch, Vendor Advisory x_refsource_misc
https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
Mailing List mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
Scores
CVSS v3
6.1
EPSS
0.0053
EPSS Percentile
67.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (7)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
debian/debian_linux
8.0
lxml/lxml
< 4.2.5
pypi/lxml
0 - 4.2.5PyPI
Published
Dec 02, 2018
Tracked Since
Feb 18, 2026