CVE-2026-6019
⚪ Do wiadomości
Wykonanie skryptu w http.cookies.Morsel umożliwia atak XSS przez nieprawidłowe osadzenie skryptu.
CVSS
0.0
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
http.cookies.Morsel.js_output() returns an inline <script> snippet and only escapes " for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence </script> inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 0.0 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-22 20:16:42 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 16:16:28 UTC |
Referencje
- https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c (cna@python.org)
- https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104 (cna@python.org)
- https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8 (cna@python.org)
- https://github.com/python/cpython/issues/90309 (cna@python.org)
- https://github.com/python/cpython/pull/148848 (cna@python.org)
- https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/ (cna@python.org)