{"schema_version":"1.7.2","id":"OESA-2021-1178","modified":"2021-05-06T11:02:53Z","published":"2021-05-06T11:02:53Z","upstream":["CVE-2021-28957"],"summary":"python-lxml security update","details":"The lxml XML toolkit is a Pythonic binding for the C libraries libxml2 and libxslt. It is unique in that it combines the speed and XML feature completeness of these libraries with the simplicity of a native Python API, mostly compatible but superior to the well-known ElementTree API. The latest release works with all CPython versions from 2.7 to 3.7.\r\n\r\nSecurity Fix(es):\r\n\r\nAn XSS vulnerability was discovered in python-lxml\u0026apos;s clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3.(CVE-2021-28957)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"python-lxml","purl":"pkg:rpm/openEuler/python-lxml\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.5.2-3.oe1"}]}],"ecosystem_specific":{"aarch64":["python-lxml-debugsource-4.5.2-3.oe1.aarch64.rpm","python2-lxml-4.5.2-3.oe1.aarch64.rpm","python-lxml-debuginfo-4.5.2-3.oe1.aarch64.rpm","python3-lxml-4.5.2-3.oe1.aarch64.rpm"],"noarch":["python-lxml-help-4.5.2-3.oe1.noarch.rpm"],"src":["python-lxml-4.5.2-3.oe1.src.rpm"],"x86_64":["python3-lxml-4.5.2-3.oe1.x86_64.rpm","python2-lxml-4.5.2-3.oe1.x86_64.rpm","python-lxml-debugsource-4.5.2-3.oe1.x86_64.rpm","python-lxml-debuginfo-4.5.2-3.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28957"}],"database_specific":{"severity":"Medium"}}