Vulnerability CVE-2023-39318: Information

Description

The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.

Severity: MEDIUM (6.1) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Published: Sept. 8, 2023
Modified: Nov. 25, 2023
Error type identifier: CWE-79

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
golangsisyphus1.21.1-alt11.22.3-alt1ALT-PU-2023-5463-1328866Fixed
golangsisyphus_riscv641.21.1-alt0.port1.22.2-alt1ALT-PU-2023-5614-1-Fixed
golangp101.20.8-alt11.21.9-alt1ALT-PU-2023-5464-2328867Fixed
golangc10f11.20.8-alt11.21.9-alt1ALT-PU-2023-5492-2328868Fixed
golangc9f21.20.11-alt11.20.11-alt1ALT-PU-2023-7055-2333913Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
      Start including
      1.21.0
      End excliding
      1.21.1

      cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
      End excliding
      1.20.8