Vulnerability Description
Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Golang | Go | < 1.19.9 |
Related Weaknesses (CWE)
References
- https://go.dev/cl/491615Patch
- https://go.dev/issue/59720Issue TrackingPatch
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsUMailing ListRelease Notes
- https://pkg.go.dev/vuln/GO-2023-1751Vendor Advisory
- https://go.dev/cl/491615Patch
- https://go.dev/issue/59720Issue TrackingPatch
- https://groups.google.com/g/golang-announce/c/MEb0UyuSMsUMailing ListRelease Notes
- https://pkg.go.dev/vuln/GO-2023-1751Vendor Advisory
- https://security.netapp.com/advisory/ntap-20241129-0005/
FAQ
What is CVE-2023-24539?
CVE-2023-24539 is a vulnerability with a CVSS score of 7.3 (HIGH). Angle brackets (<>) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the C...
How severe is CVE-2023-24539?
CVE-2023-24539 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24539?
Check the references section above for vendor advisories and patch information. Affected products include: Golang Go.