Skip to content

SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc

Moderate severity GitHub Reviewed Published Apr 12, 2022 in ietf-tools/xml2rfc • Updated Jan 11, 2023

Package

pip xml2rfc (pip)

Affected versions

< 3.12.4

Patched versions

3.12.4

Description

xml2rfc allows script elements in SVG sources.
In HTML output having these script elements can lead to XSS attacks.

Sample XML snippet:

<artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E">
</artwork>

Impact

This vulnerability impacts website that publish HTML drafts and RFCs.

Patches

This has been fixed in version 3.12.4.

Workarounds

If SVG source is self-contained within the XML, scraping script elements from SVG files.

References

For more information

If you have any questions or comments about this advisory:

References

@kesara kesara published to ietf-tools/xml2rfc Apr 12, 2022
Published to the GitHub Advisory Database Apr 22, 2022
Reviewed Apr 22, 2022
Last updated Jan 11, 2023

Severity

Moderate

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-cf4q-4cqr-7g7w

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.