Bug 1179534 (CVE-2020-27783) - VUL-0: CVE-2020-27783: python3-lxml,python-lxml: mXSS due to the use of improper parser
Summary: VUL-0: CVE-2020-27783: python3-lxml,python-lxml: mXSS due to the use of impro...
Status: RESOLVED FIXED
Alias: CVE-2020-27783
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/272347/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-27783:6.1:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-12-02 14:29 UTC by Robert Frohl
Modified: 2024-05-16 11:21 UTC (History)
9 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---
rfrohl: needinfo? (thomas.schraitle)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2020-12-02 14:29:41 UTC
rh#1901633

The python-lxml package from version 1.2 and before version 4.6.1 is vulnerable to mXSS due to the use of improper parser. The parser used doesn't imitate browsers, which causes different behaviors between the sanitizer and the user's page. This can result in an arbitrary HTML/JS code execution.

References:
https://pypi.org/project/lxml/4.6.1/
https://github.com/lxml/lxml/commit/89e7aad6e7ff9ecd88678ff25f885988b184b26e

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1901633
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27783
Comment 1 Robert Frohl 2020-12-02 14:31:02 UTC
tracking as affected:

python-lxml
- SUSE:SLE-11:Update
- SUSE:SLE-11-SP3:Update
- SUSE:SLE-12-SP2:Update
- SUSE:SLE-12-SP4:Update:Products:Cloud9:Update
- SUSE:SLE-15:Update
- SUSE:SLE-15-SP2:Update

python3-lxml
- SUSE:SLE-12:Update
- SUSE:SLE-12-SP4:Update
Comment 3 Swamp Workflow Management 2022-03-10 20:20:10 UTC
openSUSE-SU-2022:0803-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1118088,1179534,1184177,1193752
CVE References: CVE-2018-19787,CVE-2020-27783,CVE-2021-28957,CVE-2021-43818
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    python-lxml-4.7.1-3.7.1
openSUSE Leap 15.3 (src):    python-lxml-4.7.1-3.7.1
Comment 4 Swamp Workflow Management 2022-03-10 20:21:55 UTC
SUSE-SU-2022:0803-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 1118088,1179534,1184177,1193752
CVE References: CVE-2018-19787,CVE-2020-27783,CVE-2021-28957,CVE-2021-43818
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    python-lxml-4.7.1-3.7.1
SUSE Manager Retail Branch Server 4.1 (src):    python-lxml-4.7.1-3.7.1
SUSE Manager Proxy 4.1 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Module for Python2 15-SP3 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    python-lxml-4.7.1-3.7.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    python-lxml-4.7.1-3.7.1
SUSE Enterprise Storage 7 (src):    python-lxml-4.7.1-3.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Swamp Workflow Management 2022-03-17 20:17:26 UTC
SUSE-SU-2022:0895-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1118088,1179534,1184177,1193752
CVE References: CVE-2018-19787,CVE-2020-27783,CVE-2021-28957,CVE-2021-43818
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    python-lxml-3.6.1-8.5.1
SUSE OpenStack Cloud 8 (src):    python-lxml-3.6.1-8.5.1
SUSE Linux Enterprise Server 12-SP5 (src):    python-lxml-3.6.1-8.5.1
HPE Helion Openstack 8 (src):    python-lxml-3.6.1-8.5.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2022-05-18 19:16:15 UTC
SUSE-SU-2022:1729-1: An update that solves 17 vulnerabilities, contains two features and has one errata is now available.

Category: security (important)
Bug References: 1118088,1179534,1184177,1186380,1189390,1189794,1192070,1192073,1192075,1193597,1193688,1193752,1194521,1194551,1194552,1194952,1194954,1199138
CVE References: CVE-2018-19787,CVE-2020-27783,CVE-2021-28957,CVE-2021-38155,CVE-2021-40085,CVE-2021-41182,CVE-2021-41183,CVE-2021-41184,CVE-2021-43813,CVE-2021-43818,CVE-2021-44716,CVE-2022-22815,CVE-2022-22816,CVE-2022-22817,CVE-2022-23451,CVE-2022-23452,CVE-2022-29970
JIRA References: SOC-11620,SOC-11621
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    grafana-6.7.4-3.26.1, openstack-barbican-7.0.1~dev24-3.14.1, openstack-cinder-13.0.10~dev24-3.34.2, openstack-heat-gbp-14.0.1~dev4-3.9.1, openstack-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1, openstack-ironic-11.1.5~dev18-3.28.2, openstack-keystone-14.2.1~dev9-3.28.2, openstack-neutron-13.0.8~dev206-3.40.1, openstack-neutron-gbp-14.0.1~dev33-3.31.1, python-Pillow-5.2.0-3.17.1, python-XStatic-jquery-ui-1.13.0.1-4.3.1, python-lxml-4.2.4-3.3.1, release-notes-suse-openstack-cloud-9.20220413-3.30.1, rubygem-sinatra-1.4.6-4.3.1
SUSE OpenStack Cloud 9 (src):    ardana-barbican-9.0+git.1644879908.8a641c1-3.13.1, grafana-6.7.4-3.26.1, openstack-barbican-7.0.1~dev24-3.14.1, openstack-cinder-13.0.10~dev24-3.34.2, openstack-heat-gbp-14.0.1~dev4-3.9.1, openstack-horizon-plugin-gbp-ui-14.0.1~dev3-3.9.1, openstack-ironic-11.1.5~dev18-3.28.2, openstack-keystone-14.2.1~dev9-3.28.2, openstack-neutron-13.0.8~dev206-3.40.1, openstack-neutron-gbp-14.0.1~dev33-3.31.1, python-Pillow-5.2.0-3.17.1, python-XStatic-jquery-ui-1.13.0.1-4.3.1, python-lxml-4.2.4-3.3.1, release-notes-suse-openstack-cloud-9.20220413-3.30.1, venv-openstack-barbican-7.0.1~dev24-3.35.2, venv-openstack-cinder-13.0.10~dev24-3.38.1, venv-openstack-designate-7.0.2~dev2-3.35.1, venv-openstack-glance-17.0.1~dev30-3.33.1, venv-openstack-heat-11.0.4~dev4-3.35.1, venv-openstack-horizon-14.1.1~dev11-4.39.1, venv-openstack-ironic-11.1.5~dev18-4.33.1, venv-openstack-keystone-14.2.1~dev9-3.36.1, venv-openstack-magnum-7.2.1~dev1-4.35.1, venv-openstack-manila-7.4.2~dev60-3.41.1, venv-openstack-monasca-2.7.1~dev10-3.37.1, venv-openstack-monasca-ceilometer-1.8.2~dev3-3.35.1, venv-openstack-neutron-13.0.8~dev206-6.39.1, venv-openstack-nova-18.3.1~dev91-3.39.1, venv-openstack-octavia-3.2.3~dev7-4.35.1, venv-openstack-sahara-9.0.2~dev15-3.35.1, venv-openstack-swift-2.19.2~dev48-2.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Gianluca Gabrielli 2022-08-09 07:47:26 UTC
Hi Thomas, you are the bug-owner of the affected package. You can see it by running:

> >isc bugowner -e python-lxml
> Defined in package: SUSE:SLE-15:GA/python-lxml
>   bugowner of python-lxml :
>    thomas.schraitle@suse.com

Gayane submitted for Cloud products, can you please submit to all the other codestreams? Thanks
Comment 11 Thomas Schraitle 2022-08-09 07:51:39 UTC
(In reply to Gianluca Gabrielli from comment #10)
> Hi Thomas, you are the bug-owner of the affected package. You can see it by
> running:
> 
> > >isc bugowner -e python-lxml
> > Defined in package: SUSE:SLE-15:GA/python-lxml
> >   bugowner of python-lxml :
> >    thomas.schraitle@suse.com

Thanks, I was aware of that, but I didn't find a way to remove myself. Any idea?
Comment 12 Gianluca Gabrielli 2022-08-09 08:15:33 UTC
Assuming you were the maintainer and now you want to step-back, then you need to inform your line-manager who needs to find a new maintainer.
Comment 24 Swamp Workflow Management 2022-09-29 13:19:28 UTC
SUSE-SU-2022:3461-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1179534
CVE References: CVE-2020-27783
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 12-SP5 (src):    python3-lxml-3.6.1-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 25 Swamp Workflow Management 2022-09-29 13:25:38 UTC
SUSE-SU-2022:3460-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1179534
CVE References: CVE-2020-27783
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Public Cloud 12 (src):    python3-lxml-3.3.5-3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 27 Swamp Workflow Management 2022-11-01 14:31:18 UTC
SUSE-SU-2022:3836-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1179534,1184177
CVE References: CVE-2020-27783,CVE-2021-28957
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    python-lxml-4.0.0-150000.4.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.