漏洞标题
如果允许style标签,则可能存在XSS绕过的情况
漏洞描述信息
如果允许样式标签,可能存在XSS绕过的情况
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
漏洞类别
N/A
漏洞标题
Possible XSS bypass if style tag is allowed
漏洞描述信息
HtmlSanitizer is a .NET library for cleaning HTML fragments and documents from constructs that can lead to XSS attacks. In HtmlSanitizer before version 5.0.372, there is a possible XSS bypass if style tag is allowed. If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. The problem has been fixed in version 5.0.372.
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
漏洞类别
输出中的特殊元素转义处理不恰当(注入)
漏洞标题
Mganss HtmlSanitizer 跨站脚本漏洞
漏洞描述信息
Mganss HtmlSanitizer是Mganss个人开发者的一个基于C#、AngleSharp用于从清楚源代码中可能导致XSS攻击的HTML代码和文档的软件。 HtmlSanitizer 存在跨站脚本漏洞,攻击者可利用该漏洞就可以在通过杀毒软件后制作包含脚本的HTML。
CVSS信息
N/A
漏洞类别
跨站脚本