blob: 52e224955b3ea96be5beeb4b910bb2802d559708 [file] [log] [blame]
id: GO-2023-2041
modules:
- module: std
versions:
- fixed: 1.20.8
- introduced: 1.21.0-0
fixed: 1.21.1
vulnerable_at: 1.21.0
packages:
- package: html/template
symbols:
- isComment
- escaper.escapeText
- tJS
- tLineCmt
derived_symbols:
- Template.Execute
- Template.ExecuteTemplate
summary: Improper handling of HTML-like comments in script contexts in html/template
description: |-
The html/template package does not properly handle HTML-like "" comment tokens,
nor hashbang "#!" comment tokens, in <script> contexts. This may cause the
template parser to improperly interpret the contents of <script> contexts,
causing actions to be improperly escaped. This may be leveraged to perform an
XSS attack.
credits:
- Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)
references:
- report: https://go.dev/issue/62196
- fix: https://go.dev/cl/526156
- web: https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ
cve_metadata:
id: CVE-2023-39318
cwe: 'CWE-79: Improper Neutralization of Input During Web Page Generation (''Cross-site Scripting'')'
references:
- https://security.netapp.com/advisory/ntap-20231020-0009/
- https://security.gentoo.org/glsa/202311-09