OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/OWASP/json-sanitizer/pull/20 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:32:14.557Z
Reserved: 2020-06-09T00:00:00
Link: CVE-2020-13973

No data.

Status : Modified
Published: 2020-06-09T04:15:10.983
Modified: 2024-11-21T05:02:16.377
Link: CVE-2020-13973

No data.