Search for vulnerabilities
Vulnerability details: VCID-cah8-awtr-aaad
Vulnerability ID VCID-cah8-awtr-aaad
Aliases CVE-2018-19787
GHSA-xp26-p53h-6h2p
PYSEC-2018-12
Summary An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19787.html
cvssv3 4.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19787.json
epss 0.00257 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00257 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00257 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00257 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00418 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00475 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.00807 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
epss 0.01021 https://api.first.org/data/v1/epss?cve=CVE-2018-19787
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1660235
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19787
cvssv3.1 4.8 https://cwe.mitre.org/data/definitions/79.html
generic_textual MODERATE https://cwe.mitre.org/data/definitions/79.html
cvssv3.1 5.4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 6.1 https://github.com/advisories/GHSA-xp26-p53h-6h2p
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-xp26-p53h-6h2p
generic_textual MODERATE https://github.com/advisories/GHSA-xp26-p53h-6h2p
cvssv3.1 5.3 https://github.com/lxml/lxml
generic_textual MODERATE https://github.com/lxml/lxml
cvssv3.1 6.1 https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
generic_textual MODERATE https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
cvssv3.1 6.1 https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
cvssv3.1 6.1 https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
cvssv3.1 6.1 https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2018-19787
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2018-19787
generic_textual Medium https://ubuntu.com/security/notices/USN-3841-1
generic_textual Medium https://ubuntu.com/security/notices/USN-3841-2
cvssv3.1 6.1 https://usn.ubuntu.com/3841-1
generic_textual MODERATE https://usn.ubuntu.com/3841-1
cvssv3.1 6.1 https://usn.ubuntu.com/3841-2
generic_textual MODERATE https://usn.ubuntu.com/3841-2
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-19787.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19787.json
https://api.first.org/data/v1/epss?cve=CVE-2018-19787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19787
https://cwe.mitre.org/data/definitions/79.html
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/advisories/GHSA-xp26-p53h-6h2p
https://github.com/lxml/lxml
https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
https://ubuntu.com/security/notices/USN-3841-1
https://ubuntu.com/security/notices/USN-3841-2
https://usn.ubuntu.com/3841-1
https://usn.ubuntu.com/3841-1/
https://usn.ubuntu.com/3841-2
https://usn.ubuntu.com/3841-2/
1660235 https://bugzilla.redhat.com/show_bug.cgi?id=1660235
cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
CVE-2018-19787 https://nvd.nist.gov/vuln/detail/CVE-2018-19787
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19787.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N Found at https://cwe.mitre.org/data/definitions/79.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/advisories/GHSA-xp26-p53h-6h2p
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://github.com/lxml/lxml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-19787
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-19787
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://usn.ubuntu.com/3841-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://usn.ubuntu.com/3841-2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.64622
EPSS Score 0.00257
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.