CVE-2011-4457: OWASP HTML Sanitizer allows redirecting to an arbitrary URL when JavaScript is disabled
2.6
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44802%
CWE
Published
5/17/2022
Updated
1/19/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:H/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer | maven | < 88 | 88 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two key issues: 1) The HTML sanitizer's handling of NOSCRIPT elements as CDATA_SOMETIMES in HtmlTextEscapingMode.java allowed raw content interpretation when JavaScript was disabled. 2) The lack of raw-text element substitution in writeOpenTag (using canonicalName instead of safeName) permitted legacy raw-text elements to bypass proper escaping. The patch addressed both by removing CDATA_SOMETIMES for NOSCRIPT and introducing safeName to substitute raw-text elements with 'pre', preventing browser confusion about content boundaries.