Advisories ยป MGASA-2023-0169

Updated golang packages fix security vulnerability

Publication date: 16 May 2023
Modification date: 16 May 2023
Type: security
Affected Mageia releases : 8
CVE: CVE-2023-24539 , CVE-2023-24540 , CVE-2023-29400

Description

Angle brackets (<>) were not considered dangerous characters when inserted
into CSS contexts. Templates containing multiple actions separated by a
'/' character could result in unexpectedly closing the CSS context and
allowing for injection of unexpected HMTL, if executed with untrusted
input. (CVE-2023-24539)
Not all valid JavaScript whitespace characters were considered to be
whitespace. Templates containing whitespace characters outside of the
character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that
also contain actions may not be properly sanitized during execution.
(CVE-2023-24540)
Templates containing actions in unquoted HTML attributes (e.g.
"attr={{.}}") executed with empty input could result in output that would
have unexpected results when parsed due to HTML normalization rules. This
may allow injection of arbitrary attributes into tags. (CVE-2023-29400)
                

References

SRPMS

8/core