Description
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
Remediation
References
https://github.com/nahsra/antisamy/releases/tag/v1.7.4
https://github.com/nahsra/antisamy/security/advisories/GHSA-pcf2-gh6g-h5r2
Related Vulnerabilities
CVE-2023-40346 Vulnerability in maven package io.jenkins.plugins:shortcut-job
CVE-2018-11784 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2023-42278 Vulnerability in maven package cn.hutool:hutool-json
CVE-2023-39152 Vulnerability in maven package org.jenkins-ci.plugins:gradle
CVE-2017-1000427 Vulnerability in maven package org.webjars:marked