CVE-2023-39319

The html/template package does not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://go.dev/cl/526157 - Patch () https://go.dev/cl/526157 - Patch
References () https://go.dev/issue/62197 - Issue Tracking () https://go.dev/issue/62197 - Issue Tracking
References () https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ - Release Notes () https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ - Release Notes
References () https://pkg.go.dev/vuln/GO-2023-2043 - Vendor Advisory () https://pkg.go.dev/vuln/GO-2023-2043 - Vendor Advisory
References () https://security.gentoo.org/glsa/202311-09 - () https://security.gentoo.org/glsa/202311-09 -
References () https://security.netapp.com/advisory/ntap-20231020-0009/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20231020-0009/ - Third Party Advisory

25 Nov 2023, 11:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202311-09 -

02 Nov 2023, 02:22

Type Values Removed Values Added
References (MISC) https://security.netapp.com/advisory/ntap-20231020-0009/ - (MISC) https://security.netapp.com/advisory/ntap-20231020-0009/ - Third Party Advisory

20 Oct 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20231020-0009/ -

12 Sep 2023, 15:09

Type Values Removed Values Added
First Time Golang go
Golang
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79
CPE cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*
References (MISC) https://go.dev/cl/526157 - (MISC) https://go.dev/cl/526157 - Patch
References (MISC) https://pkg.go.dev/vuln/GO-2023-2043 - (MISC) https://pkg.go.dev/vuln/GO-2023-2043 - Vendor Advisory
References (MISC) https://go.dev/issue/62197 - (MISC) https://go.dev/issue/62197 - Issue Tracking
References (MISC) https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ - (MISC) https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ - Release Notes

08 Sep 2023, 17:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-08 17:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39319

Mitre link : CVE-2023-39319

CVE.ORG link : CVE-2023-39319


JSON object : View

Products Affected

golang

  • go
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')