CVE-2022-36020: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package masterminds/html5
, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of typo3/html-sanitizer
. This issue has been addressed in versions 1.0.7 and 2.0.16 of the typo3/html-sanitizer
package. Users are advised to upgrade. There are no known workarounds for this issue.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2022-36020.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2022-36020.yaml
- github.com/FriendsOfPHP/security-advisories/blob/master/typo3/html-sanitizer/CVE-2022-36020.yaml
- github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493
- github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235
- github.com/advisories/GHSA-47m6-46mj-p235
- nvd.nist.gov/vuln/detail/CVE-2022-36020
- packagist.org/packages/masterminds/html5
- packagist.org/packages/typo3/html-sanitizer
- typo3.org/security/advisory/typo3-core-sa-2022-011
Detect and mitigate CVE-2022-36020 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →