fkie_cve-2014-3146
Vulnerability from fkie_nvd
Published
2014-05-14 19:55
Modified
2024-11-21 02:07
Severity ?
Summary
Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0218.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html
secalert@redhat.comhttp://lxml.de/3.3/changes-3.3.5.html
secalert@redhat.comhttp://seclists.org/fulldisclosure/2014/Apr/210
secalert@redhat.comhttp://seclists.org/fulldisclosure/2014/Apr/319Exploit
secalert@redhat.comhttp://secunia.com/advisories/58013Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/58744
secalert@redhat.comhttp://secunia.com/advisories/59008
secalert@redhat.comhttp://www.debian.org/security/2014/dsa-2941
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:112
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2014/05/09/7
secalert@redhat.comhttp://www.securityfocus.com/bid/67159Exploit
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2217-1
secalert@redhat.comhttps://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0218.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html
af854a3a-2127-422b-91ae-364da2661108http://lxml.de/3.3/changes-3.3.5.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2014/Apr/210
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2014/Apr/319Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58013Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58744
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59008
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-2941
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:112
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/05/09/7
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/67159Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2217-1
af854a3a-2127-422b-91ae-364da2661108https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.htmlExploit
Impacted products
Vendor Product Version
lxml lxml *
lxml lxml 0.5
lxml lxml 0.5.1
lxml lxml 0.6
lxml lxml 0.7
lxml lxml 0.8
lxml lxml 0.9
lxml lxml 0.9.1
lxml lxml 0.9.2
lxml lxml 1.0
lxml lxml 1.0.1
lxml lxml 1.0.2
lxml lxml 1.0.3
lxml lxml 1.0.4
lxml lxml 1.1
lxml lxml 1.1.1
lxml lxml 1.1.2
lxml lxml 1.2
lxml lxml 1.2.1
lxml lxml 1.3
lxml lxml 1.3.1
lxml lxml 1.3.2
lxml lxml 1.3.3
lxml lxml 1.3.4
lxml lxml 1.3.5
lxml lxml 1.3.6
lxml lxml 2.0
lxml lxml 2.0.1
lxml lxml 2.0.2
lxml lxml 2.0.3
lxml lxml 2.0.4
lxml lxml 2.0.5
lxml lxml 2.0.6
lxml lxml 2.0.7
lxml lxml 2.0.8
lxml lxml 2.0.9
lxml lxml 2.0.10
lxml lxml 2.0.11
lxml lxml 2.1
lxml lxml 2.1
lxml lxml 2.1
lxml lxml 2.1
lxml lxml 2.1.1
lxml lxml 2.1.2
lxml lxml 2.1.3
lxml lxml 2.1.4
lxml lxml 2.2
lxml lxml 2.2
lxml lxml 2.2
lxml lxml 2.2
lxml lxml 2.2
lxml lxml 2.2
lxml lxml 2.2.1
lxml lxml 2.2.2
lxml lxml 2.2.3
lxml lxml 2.2.4
lxml lxml 2.2.5
lxml lxml 2.2.6
lxml lxml 2.2.7
lxml lxml 2.2.8
lxml lxml 2.3
lxml lxml 2.3
lxml lxml 2.3
lxml lxml 2.3
lxml lxml 2.3.1
lxml lxml 2.3.2
lxml lxml 2.3.3
lxml lxml 2.3.4
lxml lxml 2.3.5
lxml lxml 2.3.6
lxml lxml 3.0
lxml lxml 3.0
lxml lxml 3.0
lxml lxml 3.0
lxml lxml 3.0.1
lxml lxml 3.0.2
lxml lxml 3.1
lxml lxml 3.1.0
lxml lxml 3.1.1
lxml lxml 3.1.2
lxml lxml 3.2.0
lxml lxml 3.2.1
lxml lxml 3.2.2
lxml lxml 3.2.3
lxml lxml 3.2.4
lxml lxml 3.2.5
lxml lxml 3.3.0
lxml lxml 3.3.0
lxml lxml 3.3.0
lxml lxml 3.3.0
lxml lxml 3.3.0
lxml lxml 3.3.0
lxml lxml 3.3.1
lxml lxml 3.3.2
lxml lxml 3.3.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAAC1D54-E4B7-4212-A281-9AE313C7A9DC",
              "versionEndIncluding": "3.3.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "299444A8-4017-4358-9B35-0A9C475E5FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C48BCC21-D20B-4390-870D-C88C9863D46B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "779553CC-B269-479D-8885-1251541AC8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73BEB9C-4F4F-4F63-81FF-0B65D6068DA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "39876055-AAFD-4584-872E-044C111417B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "25FD79CE-8C7C-4994-80D6-CA1E98C062EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C641DEEC-643D-48AA-A2BC-3066CD02D072",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C29C1834-7ADB-4444-B892-083CCA6FD0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F26EDB-5E1C-453A-8332-6DF4FD0627F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "24F0DD2C-2836-4477-849A-F154C0BF37D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD4F21D-D09A-488A-A457-2BB5589B6B31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9DFE602-6616-4369-9CA7-5C35FA80A4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0F6513-1D7F-48D8-820C-F78A7935BE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F36E5C1-7DF3-4692-8FEE-F1007E57399B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4551FDBD-8975-4399-BD00-02EC03AD0CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F067084A-72E9-4D45-8EB9-534F718FD11C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "54021062-86DC-4B28-AD87-963F0C415798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B01E478-3B3A-4B05-AEDC-6A404DB7803A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "20751814-185B-489F-AD35-239EA168D293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB0286DD-FDA3-4B31-B579-6FD68BF88B87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B56F992-FEE5-4EB0-BB5D-B55BC2A5CDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEEE806-93A1-4683-9524-66B969E96D9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DC60E8-18F6-414F-81A0-37EAEF9D73A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B693FE5-0F4F-441C-8D6D-B2B0C00F4784",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3319AB13-F589-44CA-8936-3A4D23C3C8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCC3B496-51EE-41E0-B785-E9E4FA530116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "041CED1D-1D91-4BAC-8182-BE5870ADFEB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F93A757-1B1A-4E69-89FD-B738F80C560D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E58E8C6-6979-4256-947C-887D7E3F611A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "06AC5F6D-F72C-4D30-997D-0202D9CACA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AFA1D4-265D-4B72-B6A0-9F31F4612C33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A216360-8892-4118-96DE-77EB7D17CA51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3513EB-8A8F-43AE-B079-AA5E27569CDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EDD3E4E-A3C0-4686-BD91-9B58CBC74DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDDCFAEE-9C4B-4610-81A5-A5AD4420D579",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "88206B3E-503D-4C9C-85A2-8E1FB720E962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9D682D-CF6B-43FB-A29D-50BC54FB3E99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "925AF6FD-EB7C-48EA-8747-5066103C58A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "940C521B-EF4D-4A90-B1E1-E52C9793D645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "F3AB9E27-9017-4207-A66E-199CFD9EE4B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "8900D734-E782-4759-A4DD-D577A462042C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C66C8E1-EE4E-4462-8844-15995FD1FB93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9747A1D-D644-442B-B2AE-C8D962B187E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "777CB9D2-EACF-4F1A-B533-BFED0B27D214",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "58001941-9E40-45D7-9892-C79B7A8F3720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "4C7FE4FA-6C7C-4A3C-B2EE-C6B70C8A3F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "F7E1DFA9-CC7B-4E9F-A2E4-0FE8DF536101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "B40A7ED8-0D71-430E-BCF1-640D816C0230",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "8790354C-5A4B-4CD3-ACB1-FE5AA0900281",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E1B6857F-0990-4083-9876-5DDF5FA473B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "049C39E8-4804-4048-9999-A1EAFD5B910B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C51525BB-5967-4C7F-9188-5E3895B3A2CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9DC336F-02E7-4E1C-A8EA-21DEE84A52F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD4FB16F-6BFA-4D2A-8D48-1A01154C3F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "00400181-FA11-49CE-B932-4F21A8278D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6392F721-9F0D-4BBC-B392-A9C6F14F7F17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "95F6166A-3856-451D-AFAA-56C5D09752D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0D09BB-8796-40F1-8599-107B9C775C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7550F3D6-4FCC-4AD5-A92D-D984A6824AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "30EAB48D-A728-46FB-92B3-0B97CF85E72B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "127C133B-5022-46FB-9D6F-05FB2E83CA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "D3E49A50-3861-4265-BB2B-ABEA50C6DE7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D72B1891-2E24-4DA7-B243-80306866F934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDB6BCDC-7207-4895-8746-E40DDD1D5585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F0D4EB6-5ED8-4018-A1FE-9BEB6D511830",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "627C0FA1-7425-4E6B-92C5-652D4F62ECAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "70059F02-B63D-4583-8AD4-769BA648317F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4FCBFB-632A-451E-8A17-C4A8F8A65AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8763BB95-EBF9-40A1-908C-4207D87FE578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "BC015741-8F99-4F3D-B3F6-07BF23A70DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "D1A35DEE-2561-4B4A-BFE0-C443C70175BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "6FBFD00B-5821-400E-A83C-FB0D1C26A4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "9AB7BA95-5BEC-4AC6-8F93-5D918D1B31D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDAEFE73-F873-4F48-A274-F6CCB40766DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ED8D046-5701-4AD4-BFA6-D186AA596B26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "685D86D0-4A37-4B9B-BD70-C1127EA51907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B72ABBA-9319-4BFE-8F3B-F6F36F64EB12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2684097-3082-4612-8E1B-5CA6D2E20E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7981486F-129D-433B-A489-0AB90A2062E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C3BB16-3D44-43E8-AEF5-3454495F0CC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD521388-6E28-427E-9086-79BCEDB1025F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BFA21DA-4807-496D-B63A-F95E6E9F39FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B742D1-4838-4D48-A17A-386E0CF517B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1191E15-DC8D-4D2B-8563-10DFFF60CD51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA34CA6-7309-490C-8DB7-7F051F9C3CDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "E58C7CFD-0135-4D59-8D9D-A12A7BACF387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "5FE30C26-028B-41A1-842C-1AF19E551F54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "188EA215-8ACA-482F-9283-6780E29B5F4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "738B75AC-0AFC-4108-88A1-80EC6D03FBD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "99226ADA-A62E-4366-BDD1-1D33BDCA813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "2F1E30E8-484C-4925-9B6F-DD266AC602B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "02E0191B-661F-4C60-AC7F-68B95E730013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7922BC86-D318-404B-A39B-8AC9B1AF70BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:lxml:lxml:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26BFDC2C-CAFE-4301-903F-31713885EB94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incomplete blacklist vulnerability in the lxml.html.clean module in lxml before 3.3.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via control characters in the link scheme to the clean_html function."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de lista negra incompleta en el m\u00f3dulo lxml.html.clean en lxml anterior a 3.3.5 permite a atacantes remotos realizar ataques de XSS a trav\u00e9s de caracteres de control en la esquema de enlace hacia la funci\u00f3n clean_html."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/184.html\n\n\"CWE-184: Incomplete Blacklist\"",
  "id": "CVE-2014-3146",
  "lastModified": "2024-11-21T02:07:32.220",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-05-14T19:55:11.653",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2014-0218.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lxml.de/3.3/changes-3.3.5.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2014/Apr/210"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/319"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/58013"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/58744"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59008"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2014/dsa-2941"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:112"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2014/05/09/7"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/67159"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2217-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0218.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lxml.de/3.3/changes-3.3.5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2014/Apr/210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Apr/319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/58013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59008"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2014/dsa-2941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:112"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/05/09/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/67159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2217-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.