Debian Package Tracker
Register | Log in
Subscribe

libowasp-antisamy-java

OWASP AntiSamy

Choose email to subscribe with

general
  • source: libowasp-antisamy-java (main)
  • version: 1.7.4-1
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Matthew Vernon [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.5.3+dfsg-1
  • oldstable: 1.5.3+dfsg-1.1
  • stable: 1.5.3+dfsg-1.1
  • testing: 1.7.4-1
  • unstable: 1.7.4-1
versioned links
  • 1.5.3+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.3+dfsg-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libowasp-antisamy-java
action needed
A new upstream version is available: 1.7.8 high
A new upstream version 1.7.8 is available, you should consider packaging it.
Created: 2024-02-05 Last update: 2025-05-13 20:34
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2024-23635: AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.
Created: 2024-02-03 Last update: 2025-02-27 05:02
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2024-23635: AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.
Created: 2024-02-03 Last update: 2025-02-27 05:02
debian/patches: 1 patch to forward upstream low

Among the 1 debian patch available in version 1.7.4-1 of the package, we noticed the following issues:

  • 1 patch where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-12-03 18:41
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-02-27 13:25
No known security issue in bookworm wishlist

There are 7 open security issues in bookworm.

7 ignored issues:
  • CVE-2016-10006: In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
  • CVE-2017-14735: OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.
  • CVE-2021-35043: OWASP AntiSamy before 1.6.4 allows XSS via HTML attributes when using the HTML output serializer (XHTML is not affected). This was demonstrated by a javascript: URL with &#00058 as the replacement for the : character.
  • CVE-2022-28366: Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839.
  • CVE-2022-28367: OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
  • CVE-2023-43643: AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to version 1.7.4, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file and also allow for certain tags at the same time. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. This issue has been patched in AntiSamy 1.7.4 and later.
  • CVE-2024-23635: AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. Prior to 1.7.5, there is a potential for a mutation XSS (mXSS) vulnerability in AntiSamy caused by flawed parsing of the HTML being sanitized. To be subject to this vulnerability the `preserveComments` directive must be enabled in your policy file. As a result, certain crafty inputs can result in elements in comment tags being interpreted as executable when using AntiSamy's sanitized output. Patched in AntiSamy 1.7.5 and later.
Created: 2023-06-10 Last update: 2025-02-27 05:02
news
[rss feed]
  • [2023-12-08] libowasp-antisamy-java 1.7.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-12-03] Accepted libowasp-antisamy-java 1.7.4-1 (source) into unstable (Markus Koschany)
  • [2023-12-03] libowasp-antisamy-java REMOVED from testing (Debian testing watch)
  • [2021-01-13] libowasp-antisamy-java 1.5.3+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • [2021-01-08] Accepted libowasp-antisamy-java 1.5.3+dfsg-1.1 (source) into unstable (Holger Levsen)
  • [2014-06-10] libowasp-antisamy-java 1.5.3+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2014-05-30] Accepted libowasp-antisamy-java 1.5.3+dfsg-1 (source all) (Matthew Vernon)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.7.4-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing