Vulnerability Name:

CVE-2020-26870 (CCN-189516)

Assigned:2020-09-21
Published:2020-09-21
Updated:2022-04-27
Summary:Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
CVSS v3 Severity:6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
6.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)
6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Cross-Site Scripting
References:Source: MITRE
Type: CNA
CVE-2020-26870

Source: XF
Type: UNKNOWN
dompurify-cve202026870-xss(189516)

Source: CCN
Type: DOMPurify GIT Repository
DOMPurify

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20201029 [SECURITY] [DLA 2419-1] dompurify.js security update

Source: MS
Type: Patch, Vendor Advisory
Visual Studio Remote Code Execution Vulnerability

Source: CCN
Type: Microsoft Security TechCenter - January 2020
Microsoft Windows Media Foundation Remote Code Execution Vulnerability

Source: CCN
Type: SECURITUM Web site
Mutation XSS via namespace confusion - DOMPurify < 2.0.17 bypass

Source: MISC
Type: Exploit, Third Party Advisory
https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/

Source: CCN
Type: IBM Security Bulletin 6413705 (Security QRadar Analyst Workflow)
IBM Security QRadar Analyst Workflow add on to IBM QRadar SIEM is vulnerable to using components with known vulnerabilities

Source: CCN
Type: NPM Web site
dompurify

Source: N/A
Type: Patch, Third Party Advisory
N/A

Source: CCN
Type: Oracle CPUJul2021
Oracle Critical Patch Update Advisory - July 2021

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cure53:dompurify:*:*:*:*:*:*:*:* (Version < 2.0.17)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_studio_2019:16.0:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_studio_2019:16.4:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_studio_2019:16.7:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:visual_studio_2019:16.8:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/a:oracle:application_express:*:*:*:*:*:*:*:* (Version < 21.1.0.00.01)

  • * Denotes that component is vulnerable
    BACK
    cure53 dompurify *
    debian debian linux 9.0
    microsoft visual studio 2017 15.9
    microsoft visual studio 2019 16.0
    microsoft visual studio 2019 16.4
    microsoft visual studio 2019 16.7
    microsoft visual studio 2019 16.8
    oracle application express *