\"…","image":"https://cms.recordedfuture.com/cve-db/cve-og-image/CVE-2023-39319"},"breadcrumb":{"@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@type":"WebPage","@id":"https://www.recordedfuture.com","url":"https://www.recordedfuture.com","name":"Home"}},{"@type":"ListItem","position":2,"item":{"@type":"WebPage","@id":"https://www.recordedfuture.com/vulnerability-database","url":"https://www.recordedfuture.com/vulnerability-database","name":"Vulnerability Database"}},{"@type":"ListItem","position":3,"item":{"@type":"WebPage","@id":"https://www.recordedfuture.com/vulnerability-database/CVE-2023-39319","url":"https://www.recordedfuture.com/vulnerability-database/CVE-2023-39319","name":"CVE-2023-39319"}}]}}

CVE-2023-39319

CVSS 3.1 Score 6.1 of 10 (medium)

Details

Published Sep 8, 2023
Updated: Nov 25, 2023
CWE ID 79

Summary

CVE-2023-39319 is a vulnerability affecting the html/template package. The issue lies in the package's handling of "<script>", "<!--", and "</script>" within JS literals in <script> contexts. Instead of applying the correct rules, the parser may prematurely terminate script contexts, leading to insufficient escaping. A malicious actor could exploit this flaw to execute cross-site scripting (XSS) attacks.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share